', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:18 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:18 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:18 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:18 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:18 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621", 0x56}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 587.852001][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 587.852021][ T26] audit: type=1800 audit(1579424358.422:841): pid=18591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17597 res=0 08:59:18 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:18 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:18 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff", 0xaa}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 588.253334][ T26] audit: type=1800 audit(1579424358.822:842): pid=18615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17600 res=0 08:59:18 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:19 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 588.553137][ T26] audit: type=1800 audit(1579424359.122:843): pid=18631 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17624 res=0 08:59:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac7", 0x59}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:19 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 588.938443][ T26] audit: type=1800 audit(1579424359.512:844): pid=18648 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16609 res=0 08:59:19 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff", 0xaa}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:19 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:19 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:19 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac7", 0x59}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 589.242792][ T26] audit: type=1800 audit(1579424359.812:845): pid=18663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17600 res=0 08:59:19 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:19 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff", 0xaa}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 589.503206][ T26] audit: type=1800 audit(1579424360.072:846): pid=18679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16689 res=0 08:59:20 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:20 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac7", 0x59}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:20 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 589.820592][ T26] audit: type=1800 audit(1579424360.392:847): pid=18695 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17633 res=0 08:59:20 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:20 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 590.038908][ T26] audit: type=1800 audit(1579424360.612:848): pid=18713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16689 res=0 08:59:20 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000800, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf", 0xb0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:21 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:21 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:21 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 590.519851][ T26] audit: type=1800 audit(1579424361.092:849): pid=18736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17607 res=0 08:59:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79a", 0x5a}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:21 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf", 0xb0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:21 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 590.905893][ T26] audit: type=1800 audit(1579424361.482:850): pid=18756 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17613 res=0 08:59:21 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:21 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79a", 0x5a}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:22 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:22 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf", 0xb0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:22 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:22 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff", 0xaa}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:22 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79a", 0x5a}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:22 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622b", 0xb3}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:22 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:23 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:23 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:23 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) r2 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r2, r6, 0x0, 0x8000fffffffe) 08:59:23 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:23 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) 08:59:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622b", 0xb3}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:23 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:23 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) 08:59:23 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) r2 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r2, r6, 0x0, 0x8000fffffffe) [ 592.985490][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 592.985509][ T26] audit: type=1800 audit(1579424363.562:858): pid=18871 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17639 res=0 08:59:23 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622b", 0xb3}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:23 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:23 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) [ 593.468379][ T26] audit: type=1800 audit(1579424364.042:859): pid=18895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17594 res=0 08:59:24 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) r2 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r2, r6, 0x0, 0x8000fffffffe) [ 593.605923][ T26] audit: type=1800 audit(1579424364.182:860): pid=18903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17644 res=0 08:59:24 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:24 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:24 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x50800902, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:24 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:24 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb", 0xb4}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:24 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 594.194939][ T26] audit: type=1800 audit(1579424364.762:861): pid=18940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17647 res=0 08:59:24 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) r2 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r2, r6, 0x0, 0x8000fffffffe) [ 594.289225][ T26] audit: type=1800 audit(1579424364.862:862): pid=18944 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17594 res=0 08:59:24 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:25 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {0x0}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:25 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:25 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:25 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb", 0xb4}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 594.776595][ T26] audit: type=1800 audit(1579424365.352:863): pid=18966 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16577 res=0 08:59:25 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {0x0}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:25 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) r2 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r2, r6, 0x0, 0x8000fffffffe) [ 595.067131][ T26] audit: type=1800 audit(1579424365.642:864): pid=18986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16487 res=0 08:59:25 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:25 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:25 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 595.194643][ T26] audit: type=1800 audit(1579424365.702:865): pid=18980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17594 res=0 08:59:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {0x0}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:26 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) r2 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r2, r6, 0x0, 0x8000fffffffe) 08:59:26 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:26 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb", 0xb4}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:26 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 595.812416][ T26] audit: type=1800 audit(1579424366.382:866): pid=19014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17645 res=0 [ 595.932254][ T26] audit: type=1800 audit(1579424366.452:867): pid=19025 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17653 res=0 08:59:26 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:26 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:26 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:26 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:27 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:27 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:27 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:27 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6814977c6d4f0", 0xc}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a39", 0x42}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:27 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:27 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:27 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:27 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:28 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:28 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:28 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:28 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:28 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:28 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:28 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 598.086439][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 598.086460][ T26] audit: type=1800 audit(1579424368.662:875): pid=19129 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17656 res=0 08:59:28 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:28 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {0x0}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:29 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:29 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:29 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 598.682922][ T26] audit: type=1800 audit(1579424369.252:876): pid=19163 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17637 res=0 [ 598.832056][ T26] audit: type=1800 audit(1579424369.402:877): pid=19169 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17658 res=0 08:59:29 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {0x0}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:29 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:29 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:29 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) 08:59:29 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 599.305133][ T26] audit: type=1800 audit(1579424369.882:878): pid=19196 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17613 res=0 08:59:30 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 599.603990][ T26] audit: type=1800 audit(1579424370.172:879): pid=19212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17680 res=0 08:59:30 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {0x0}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:30 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) 08:59:30 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:30 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 600.013938][ T26] audit: type=1800 audit(1579424370.582:880): pid=19225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=17676 res=0 08:59:30 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:30 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) [ 600.134712][ T26] audit: type=1800 audit(1579424370.672:881): pid=19233 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16593 res=0 08:59:30 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:30 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:31 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 600.428361][ T26] audit: type=1800 audit(1579424370.972:882): pid=19246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17646 res=0 08:59:31 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 600.659455][ T26] audit: type=1800 audit(1579424371.232:883): pid=19257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16641 res=0 08:59:31 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 600.722338][ T26] audit: type=1800 audit(1579424371.292:884): pid=19269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16561 res=0 08:59:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:31 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:31 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:31 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:31 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:32 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:32 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x950f0000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:32 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:32 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, 0x0) geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6814977c6d4f0", 0xc}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3a2", 0x5a}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:32 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:32 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:32 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:32 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:32 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:32 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:33 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[], 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:33 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:33 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:33 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:33 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:33 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[], 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:33 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r0 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r0, r3, 0x0, 0x8000fffffffe) 08:59:33 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:34 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[], 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 603.441996][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 603.442014][ T26] audit: type=1800 audit(1579424374.012:895): pid=19397 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16502 res=0 08:59:34 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:34 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r0 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 603.692562][ T26] audit: type=1800 audit(1579424374.262:896): pid=19411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16625 res=0 [ 603.837773][ T26] audit: type=1800 audit(1579424374.362:897): pid=19417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16574 res=0 08:59:34 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:34 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:34 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x7, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:34 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:34 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r0 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 604.294959][ T26] audit: type=1800 audit(1579424374.852:898): pid=19441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16721 res=0 08:59:35 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 604.422223][ T26] audit: type=1800 audit(1579424374.972:899): pid=19439 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16945 res=0 [ 604.559147][ T26] audit: type=1800 audit(1579424375.072:900): pid=19445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=17041 res=0 08:59:35 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:35 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:35 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:35 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 604.973323][ T26] audit: type=1800 audit(1579424375.542:901): pid=19473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16673 res=0 [ 605.062559][ T26] audit: type=1800 audit(1579424375.632:902): pid=19476 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16594 res=0 08:59:35 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:35 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 605.235513][ T26] audit: type=1800 audit(1579424375.802:903): pid=19484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17041 res=0 08:59:35 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:36 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:36 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xdc88a500, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:36 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:36 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 605.674056][ T26] audit: type=1800 audit(1579424376.242:904): pid=19508 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16785 res=0 08:59:36 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:36 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:36 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:36 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:36 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:37 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:37 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:37 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:37 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:37 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:37 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:37 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:38 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:38 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:38 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:38 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x8900) r3 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x0, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x14}}, 0x400c000) ioctl$RNDGETENTCNT(r3, 0x80045200, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) close(r1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r5 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) accept4$bt_l2cap(r4, 0x0, &(0x7f00000003c0), 0x1c1800) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:38 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:38 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:38 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:39 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x8900) r3 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x0, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x14}}, 0x400c000) ioctl$RNDGETENTCNT(r3, 0x80045200, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) close(r1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r5 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) accept4$bt_l2cap(r4, 0x0, &(0x7f00000003c0), 0x1c1800) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:39 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:39 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 608.790750][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 608.790772][ T26] audit: type=1800 audit(1579424379.362:916): pid=19678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16673 res=0 [ 608.911855][ T26] audit: type=1800 audit(1579424379.432:917): pid=19676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16657 res=0 08:59:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r1, 0x80045200, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 609.103243][ T26] audit: type=1800 audit(1579424379.672:918): pid=19692 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=17345 res=0 [ 609.222797][ T26] audit: type=1800 audit(1579424379.792:919): pid=19702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16561 res=0 08:59:39 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:39 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:39 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r1, 0x80045200, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 609.563678][ T26] audit: type=1800 audit(1579424380.132:920): pid=19713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17457 res=0 08:59:40 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 609.672471][ T26] audit: type=1800 audit(1579424380.242:921): pid=19724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=17521 res=0 08:59:40 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae861495276793421"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:40 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 609.880743][ T26] audit: type=1800 audit(1579424380.452:922): pid=19733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16593 res=0 08:59:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r1, 0x80045200, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 08:59:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r1, 0x80045200, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 08:59:40 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 610.238003][ T26] audit: type=1800 audit(1579424380.802:923): pid=19750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17505 res=0 [ 610.304909][ T26] audit: type=1800 audit(1579424380.872:924): pid=19759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16625 res=0 08:59:40 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae861495276793421"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 610.419686][ T26] audit: type=1800 audit(1579424380.872:925): pid=19751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=17457 res=0 08:59:41 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(0x0, 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r1, 0x80045200, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 08:59:41 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:41 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae861495276793421"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r1, 0x80045200, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 08:59:41 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(0x0, 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:41 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:42 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:42 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r1, 0x80045200, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 08:59:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(0x0, 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:42 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:42 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:42 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)="9e89f247e1bd4043c430fc24de8f7a87e8d4ab0e8e46c1f8d62cd2bb2d9900068729aca4d97238518bb75dd9843e7b386b07e31e4107575b95c18e81e5b4956137ff78bcd759c843a513a0ec8d0fc4bf2b6be2c78abc6036bf2b47e371cb1a4ecdf7e91a16965381f2cdf771046463257de5a165a9ea16c0f818d6610a38ec7654ebe1190091a311fd449fd69eeaf6a9e3efb46379dab0a803a61246745a779df88fef242b5dc7a7fdd467f60df96c68d0eb197ee8e2712660237859f612e327c84616fdf413fda2efa733d474526240ca1d08dcc2eebdff", 0xd8}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6814977c6d4f0", 0xc}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3a2", 0x5a}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:42 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:42 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:43 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:43 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x8900) r3 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r3, 0x80045200, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) close(r1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r5 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) accept4$bt_l2cap(r4, 0x0, &(0x7f00000003c0), 0x1c1800) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:43 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c000000"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:43 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:43 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:44 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c000000"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:44 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:44 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c000000"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:44 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c000000"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:44 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 614.020731][ T26] kauditd_printk_skb: 15 callbacks suppressed [ 614.020751][ T26] audit: type=1800 audit(1579424384.592:941): pid=19941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16488 res=0 08:59:44 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:44 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:44 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x0) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:45 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c00000000"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:45 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 614.551866][ T26] audit: type=1800 audit(1579424385.122:942): pid=19961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17695 res=0 [ 614.684616][ T26] audit: type=1800 audit(1579424385.212:943): pid=19967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=17691 res=0 [ 614.768180][ T26] audit: type=1800 audit(1579424385.322:944): pid=19972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17697 res=0 08:59:45 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x80800) close(r1) r2 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r5, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r2, r6, 0x0, 0x8000fffffffe) 08:59:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:45 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:45 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c00000000"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x0) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 615.181696][ T26] audit: type=1800 audit(1579424385.752:945): pid=19994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17698 res=0 08:59:45 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 615.521550][ T26] audit: type=1800 audit(1579424386.092:946): pid=20017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17704 res=0 08:59:46 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:46 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c00000000"], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:46 executing program 5 (fault-call:32 fault-nth:0): request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:46 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 615.791105][ T26] audit: type=1800 audit(1579424386.362:947): pid=20029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16574 res=0 08:59:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x0) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:46 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 616.068683][T20048] FAULT_INJECTION: forcing a failure. [ 616.068683][T20048] name failslab, interval 1, probability 0, space 0, times 0 [ 616.199367][T20048] CPU: 1 PID: 20048 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 616.208230][T20048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.218770][T20048] Call Trace: [ 616.222579][T20048] dump_stack+0x11d/0x181 [ 616.227407][T20048] should_fail.cold+0xa/0x1a [ 616.232607][T20048] __should_failslab+0xee/0x130 [ 616.237740][T20048] should_failslab+0x9/0x14 [ 616.242707][T20048] kmem_cache_alloc_trace+0x2a/0x5d0 08:59:46 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 616.248671][T20048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 616.255734][T20048] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 616.261995][T20048] alloc_pipe_info+0xf8/0x3b0 [ 616.267182][T20048] splice_direct_to_actor+0x4b3/0x540 [ 616.274022][T20048] ? generic_pipe_buf_nosteal+0x20/0x20 [ 616.279973][T20048] ? security_file_permission+0x88/0x280 [ 616.285822][T20048] ? rw_verify_area+0xee/0x250 [ 616.290842][T20048] do_splice_direct+0x161/0x1e0 08:59:46 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 616.295910][T20048] do_sendfile+0x384/0x7f0 [ 616.300829][T20048] __x64_sys_sendfile64+0x12a/0x140 [ 616.306484][T20048] do_syscall_64+0xcc/0x3a0 [ 616.311851][T20048] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 616.318582][T20048] RIP: 0033:0x45b159 [ 616.322597][T20048] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.343619][T20048] RSP: 002b:00007f2c04bafc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 616.352565][T20048] RAX: ffffffffffffffda RBX: 00007f2c04bb06d4 RCX: 000000000045b159 [ 616.360899][T20048] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000004 [ 616.369277][T20048] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 616.377888][T20048] R10: 00008000fffffffe R11: 0000000000000246 R12: 000000000000000b [ 616.386720][T20048] R13: 00000000000008a4 R14: 00000000004c9d99 R15: 0000000000000000 [ 616.463933][ T26] audit: type=1800 audit(1579424387.032:948): pid=20052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17707 res=0 [ 616.608723][ T26] audit: type=1800 audit(1579424387.182:949): pid=20059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17712 res=0 08:59:47 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 08:59:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:47 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:47 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) [ 616.929680][ T26] audit: type=1800 audit(1579424387.502:950): pid=20078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16641 res=0 08:59:47 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:47 executing program 5 (fault-call:32 fault-nth:1): request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 08:59:47 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:48 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 617.699460][T20125] FAULT_INJECTION: forcing a failure. [ 617.699460][T20125] name failslab, interval 1, probability 0, space 0, times 0 08:59:48 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 617.770263][T20125] CPU: 1 PID: 20125 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 617.779310][T20125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.789804][T20125] Call Trace: [ 617.793155][T20125] dump_stack+0x11d/0x181 [ 617.797674][T20125] should_fail.cold+0xa/0x1a [ 617.802669][T20125] __should_failslab+0xee/0x130 [ 617.807635][T20125] should_failslab+0x9/0x14 [ 617.812215][T20125] __kmalloc+0x53/0x690 [ 617.816616][T20125] ? kmem_cache_alloc_trace+0x1e9/0x5d0 [ 617.822198][T20125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 617.828864][T20125] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 617.834821][T20125] ? alloc_pipe_info+0x20e/0x3b0 [ 617.840103][T20125] alloc_pipe_info+0x20e/0x3b0 [ 617.844898][T20125] splice_direct_to_actor+0x4b3/0x540 [ 617.850316][T20125] ? generic_pipe_buf_nosteal+0x20/0x20 [ 617.856228][T20125] ? security_file_permission+0x88/0x280 [ 617.862013][T20125] ? rw_verify_area+0xee/0x250 [ 617.866888][T20125] do_splice_direct+0x161/0x1e0 [ 617.871888][T20125] do_sendfile+0x384/0x7f0 [ 617.876346][T20125] __x64_sys_sendfile64+0x12a/0x140 [ 617.881774][T20125] do_syscall_64+0xcc/0x3a0 [ 617.886312][T20125] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 617.892541][T20125] RIP: 0033:0x45b159 [ 617.896464][T20125] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:59:48 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) [ 617.916543][T20125] RSP: 002b:00007f2c04bafc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 617.924984][T20125] RAX: ffffffffffffffda RBX: 00007f2c04bb06d4 RCX: 000000000045b159 [ 617.933100][T20125] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000004 [ 617.941345][T20125] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 617.949813][T20125] R10: 00008000fffffffe R11: 0000000000000246 R12: 000000000000000b [ 617.957810][T20125] R13: 00000000000008a4 R14: 00000000004c9d99 R15: 0000000000000001 08:59:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, 0x0, 0x400c000) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 08:59:48 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:48 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:48 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:49 executing program 5 (fault-call:32 fault-nth:2): request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, 0x0, 0x400c000) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 08:59:49 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 08:59:49 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 618.725082][T20177] FAULT_INJECTION: forcing a failure. [ 618.725082][T20177] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 618.788519][T20177] CPU: 1 PID: 20177 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 618.797572][T20177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.807637][T20177] Call Trace: [ 618.810981][T20177] dump_stack+0x11d/0x181 [ 618.815549][T20177] should_fail.cold+0xa/0x1a [ 618.820199][T20177] should_fail_alloc_page+0x50/0x60 [ 618.825707][T20177] __alloc_pages_nodemask+0xd2/0x310 [ 618.831186][T20177] alloc_pages_current+0xd1/0x170 [ 618.836393][T20177] __page_cache_alloc+0x183/0x1a0 [ 618.841450][T20177] __do_page_cache_readahead+0x13e/0x390 [ 618.847503][T20177] ondemand_readahead+0x35d/0x710 [ 618.852754][T20177] page_cache_sync_readahead+0x1ad/0x1e0 [ 618.858492][T20177] generic_file_read_iter+0xeb6/0x1440 [ 618.863998][T20177] ext4_file_read_iter+0x10c/0x380 [ 618.869230][T20177] generic_file_splice_read+0x35c/0x500 [ 618.874995][T20177] do_splice_to+0xf2/0x130 [ 618.879470][T20177] ? add_to_pipe+0x1c0/0x1c0 [ 618.884179][T20177] ? add_to_pipe+0x1c0/0x1c0 [ 618.889049][T20177] splice_direct_to_actor+0x1b6/0x540 [ 618.894637][T20177] ? generic_pipe_buf_nosteal+0x20/0x20 [ 618.900638][T20177] do_splice_direct+0x161/0x1e0 [ 618.905570][T20177] do_sendfile+0x384/0x7f0 [ 618.910042][T20177] __x64_sys_sendfile64+0x12a/0x140 [ 618.915370][T20177] do_syscall_64+0xcc/0x3a0 [ 618.920278][T20177] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 618.926278][T20177] RIP: 0033:0x45b159 [ 618.930378][T20177] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.950436][T20177] RSP: 002b:00007f2c04bafc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 618.958919][T20177] RAX: ffffffffffffffda RBX: 00007f2c04bb06d4 RCX: 000000000045b159 [ 618.966919][T20177] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000004 [ 618.975038][T20177] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 08:59:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, 0x0, 0x400c000) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 08:59:49 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 618.983153][T20177] R10: 00008000fffffffe R11: 0000000000000246 R12: 000000000000000b [ 618.991211][T20177] R13: 00000000000008a4 R14: 00000000004c9d99 R15: 0000000000000002 08:59:49 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 619.088128][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 619.088146][ T26] audit: type=1800 audit(1579424389.662:957): pid=20181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17698 res=0 08:59:49 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 08:59:49 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:49 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 619.450330][ T26] audit: type=1800 audit(1579424390.022:958): pid=20199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17715 res=0 08:59:50 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:50 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:50 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(0x0, 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:50 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 619.656531][ T26] audit: type=1800 audit(1579424390.232:959): pid=20208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17687 res=0 08:59:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 08:59:50 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 619.992601][ T26] audit: type=1800 audit(1579424390.562:960): pid=20237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17734 res=0 08:59:50 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r3) sendmsg$netlink(r6, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x14}, 0x0) recvmmsg(r4, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) 08:59:50 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 620.351858][ T26] audit: type=1800 audit(1579424390.922:961): pid=20251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17710 res=0 08:59:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(0x0, 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:51 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) open$dir(0x0, 0x0, 0x6) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, r2, 0x0, 0x81420000a77, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x6, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r1, r6, 0x0, 0x8000fffffffe) 08:59:51 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:51 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 620.670432][ T26] audit: type=1800 audit(1579424391.242:962): pid=20273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16625 res=0 08:59:51 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x0) 08:59:51 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000002c0)='/dev/nbd#\x00', 0x0, 0x80000) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r7, 0x7fff) sendfile(r1, r7, 0x0, 0x8000fffffffe) 08:59:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(0x0, 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:51 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 621.168446][ T26] audit: type=1800 audit(1579424391.742:963): pid=20298 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16593 res=0 08:59:51 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 621.383137][ T26] audit: type=1800 audit(1579424391.952:964): pid=20308 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17710 res=0 08:59:52 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:52 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c2e24236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x0) 08:59:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 621.925607][ T26] audit: type=1800 audit(1579424392.492:965): pid=20344 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16574 res=0 08:59:52 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:52 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:52 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:52 executing program 5: request_key(&(0x7f0000000280)='ceph\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='oom_adj\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000380)='blacklist\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)='oom_adj\x00', 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, 0x0, 0x0, r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0x4d, 0x0) close(0xffffffffffffffff) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x4, 0x0, 0x0, 0x8, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2000000c, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xfffffffc, @rand_addr="e38774967a35fa3d969a3992f22f3a16", 0x2}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b8328e98256609dba45ac7e94a6a23e4d8aa4e31bf9801b88f7dcc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x40, 0x0) setsockopt$inet6_int(r4, 0x29, 0x35, &(0x7f00000004c0)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r2, r6, 0x0, 0x8000fffffffe) [ 621.987643][ T26] audit: type=1800 audit(1579424392.542:966): pid=20339 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17735 res=0 08:59:52 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:52 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:52 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0), 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x0) 08:59:53 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="000000000000000f1c93f50673010d746407dcd2154e75ff0700fd233bc62740f21089ab6b83a23e4d8aa4e31bf9802fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e2e5055de354d383827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e13d27f7280dc9868ae86123bb66726cac065e501e23a726b15d3949527679de22405894882c0000000000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) 08:59:53 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0), 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:53 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:53 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:53 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:53 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:53 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0), 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:53 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:53 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:54 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) 08:59:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x0) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:54 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f00000002c0)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:54 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:54 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) 08:59:54 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESOCT=r4], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77f33c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e79488c059228ff0162c0000000000d6c30c8b8308f3cb0ada4b35a4bf94"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x48, &(0x7f00000002c0)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r6, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r7, 0x7fff) sendfile(r2, r7, 0x0, 0x8000fffffffe) 08:59:54 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x0) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:54 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:54 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:54 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @rand_addr, 0x1}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0xe000, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000380)={0x0, &(0x7f0000000340)=[{}, {}, {}, {}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:54 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) [ 624.423362][T20481] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:59:55 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:55 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 624.632555][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 624.632575][ T26] audit: type=1800 audit(1579424395.202:973): pid=20495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17761 res=0 08:59:55 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000300)={0x9c0000, 0x3, 0x8, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x990a68, 0xff, [], @value64=0x3}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001b40)=[{&(0x7f0000000100)=@abs={0x1}, 0x6e, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000500)}], 0x2, 0x0, 0x0, 0x8800}, {0x0, 0x0, &(0x7f0000000780), 0x0, &(0x7f0000000880)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @cred={{0x1c}}], 0x58, 0x4000004}], 0x2, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)) r3 = gettid() tkill(r3, 0x3c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000440)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, r5}, 0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001b40)=[{&(0x7f0000000100)=@abs={0x1}, 0x6e, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000180)}], 0x2, 0x0, 0x0, 0x8800}, {0x0, 0x0, &(0x7f0000000780)=[{0x0}], 0x1, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r3}}}, @cred={{0x1c}}], 0x60, 0x4000004}], 0x2, 0x800) perf_event_open(0x0, r3, 0xfffffffffffffffc, 0xffffffffffffffff, 0x3) open$dir(0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r7 = dup(r6) setsockopt$inet6_tcp_int(r6, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r8, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r6, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r7, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r10 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r10, 0x7fff) sendfile(r7, r10, 0x0, 0x8000fffffffe) 08:59:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(0x0, 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x0) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:55 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 625.100226][ T26] audit: type=1800 audit(1579424395.672:974): pid=20521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17687 res=0 [ 625.271786][ T26] audit: type=1800 audit(1579424395.842:975): pid=20527 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16609 res=0 08:59:56 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:56 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x800) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e28, 0x0, @rand_addr="00000000001a00040d000000fcff00"}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000180)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x100000000) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:56 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:56 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:56 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:56 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 08:59:56 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:56 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:56 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) [ 625.878394][ T26] audit: type=1800 audit(1579424396.452:976): pid=20565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16544 res=0 08:59:56 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:56 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 626.297643][ T26] audit: type=1800 audit(1579424396.872:977): pid=20585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17736 res=0 08:59:57 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000028c0)='/proc/capi/capi20ncci\x00', 0x8001, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0xffff, @rand_addr="1508680c6e008000"}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) write$binfmt_elf64(r4, &(0x7f00000002c0)=ANY=[], 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e00, 0x2000000, @dev={0xfe, 0x80, [], 0x35}, 0xfffffffd}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b05001b83dabd3d38cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089d1d2ad11150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c471f236d65e12d27f7280dc9868ae861b9aa3d5e2f658b3f32ed49527679342108e794882c0000000000747478dc71145b4235fd38691909b4ecf09e5b6c01751d1bf9a6b8f429f51f76b4557e6cdb7fc4d078"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r1, r6, 0x0, 0x8000fffffffe) 08:59:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 08:59:57 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 08:59:57 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:57 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 626.798645][ T26] audit: type=1800 audit(1579424397.372:978): pid=20606 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17780 res=0 08:59:57 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 626.928716][ T26] audit: type=1800 audit(1579424397.402:979): pid=20607 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=17775 res=0 08:59:57 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:57 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:57 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000fffffffe) 08:59:57 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:58 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:58 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r7, 0x0, r6, 0x0, 0x81420000a77, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r9, 0x0, r8, 0x0, 0x81420000a77, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r11, 0x0, r10, 0x0, 0x81420000a77, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r12, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r13, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) r14 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r15, 0x0, r14, 0x0, 0x81420000a77, 0x0) r16 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r17, 0x0, r16, 0x0, 0x81420000a77, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000001680)=ANY=[@ANYRES32=r0, @ANYRES32=r4, @ANYBLOB="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", @ANYRES16=r7, @ANYRESDEC, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESDEC=r15, @ANYRESOCT, @ANYRESHEX=r10], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES16=r2, @ANYRESOCT=0x0, @ANYRES32, @ANYRESHEX=r12], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRESHEX, @ANYRES16=r2, @ANYRESDEC=0x0, @ANYBLOB="5bc7b7141a3e8a8a6b80be40d35ccc54928dc663f66ef2429edab8c21ae34557bfc9aa6a2311327a484dd90b74a2ed2c78a5b15bc56a37ca2f5dce1c6a25b0dcd41604ae00f25103177e7c3abe91d55f917a55e2a2d4ec4b25a6ae7a1af2f04eba79438bfa861df47ab834170447ca64b78b0eb67483d042bb6a5578530e71c1f09700569b54b79448768f594df9eb8b4e30d2b14211"], @ANYRESHEX=r13, @ANYPTR64=&(0x7f00000015c0)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES64=r15, @ANYRES32], @ANYBLOB="c3da5750b87366c9ae8545ac8583111794a4308f0a7c6efc37a7c413fa212e72d21ec2c06fb9184a2f20dfead586ef96ba71b56a9f8cbd4fa7ff27316bbc2586125c14a4a7368f80c3ce43884ed1a7595529dc7939c836419d0f149f68c3f82390191d90e7", @ANYBLOB="d78a763d2ce3adc115f4d35fd96552a069751bb18095eb90dfe64668ef6e19e13e487eaec904cc42262da4860df7fddfe4a8bff72090f0e9fec2c011b1", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRESOCT, @ANYRESOCT=r16]], @ANYBLOB="66acc8097468e801674162a01e051c07b9666f9a0ee625d0a8a2a6f75b6d09c56df458a7fafdac3a32f99c86d701cc09243799b893993ed1f3c8491c6122a6f3b549da293f0984eabd9195c7398b82828756a1e132a2ec1b3a7f7a2fadc3c29dab68c453274a7512f078b8c3494ad37af3aa72ee8056b047bb04df9c8a29612c10d61e70dbcbac9cf172c7b4987d9be0adb5fb210d86c07a979ab1f974e2c99512f1ba617a653b4fa3d1e87e4efbb45093b9255230b06cfaaf8803d2c209f02444fd7a67091b9c66ae2f606ee3330cdb99", @ANYRES16]], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r18, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r19 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r19, 0x7fff) sendfile(r1, r19, 0x0, 0x8000fffffffe) [ 627.509916][ T26] audit: type=1800 audit(1579424398.082:980): pid=20645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16609 res=0 08:59:58 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:58 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:58 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:58 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 08:59:58 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:58 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f00000002c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, r2, 0x0, 0x81420000a77, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 08:59:58 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 628.147914][ T26] audit: type=1800 audit(1579424398.722:981): pid=20686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17787 res=0 08:59:58 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:59 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 08:59:59 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:59 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 628.770646][ T26] audit: type=1800 audit(1579424399.342:982): pid=20723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17771 res=0 08:59:59 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 08:59:59 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 08:59:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 08:59:59 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x80000000000003, 0xf) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:59 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 08:59:59 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:00 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:00 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:00 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:00 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0xfe8a, 0x800) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="0000000000000000210d746407dcd215a154a2955ec85b064e75ff060000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817dd49caabb984949b050038cc789c58b8a6e10dc6e2d2b08db56b1f6a7b86e04e3827325dff77e63c0f76554a0c7169d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149d27679342108e794882c000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:00 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x0) 09:00:00 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:00 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 09:00:00 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) request_key(0x0, 0x0, 0x0, r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r2, r5, 0x0, 0x8000fffffffe) 09:00:00 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 630.097942][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 630.098000][ T26] audit: type=1800 audit(1579424400.672:985): pid=20799 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17779 res=0 09:00:00 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:01 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x0) 09:00:01 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsa\x00', 0x4000, 0x0) splice(r3, 0x0, r5, 0x0, 0x0, 0x12) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x8000000000000005) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ftruncate(r7, 0x7ffc) sendfile(r1, r6, 0x0, 0x8000fffffffe) 09:00:01 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(0x0, 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:01 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 630.714077][ T26] audit: type=1800 audit(1579424401.282:986): pid=20834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16539 res=0 09:00:01 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(0x0, 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:01 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:01 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:01 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 09:00:01 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x0) 09:00:01 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0xfffffffffffffffa, 0xffffffffffffffff, 0x8) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:01 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:01 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(0x0, 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 631.363585][ T26] audit: type=1800 audit(1579424401.932:987): pid=20872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16561 res=0 09:00:02 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:02 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x80, 0x0) bind$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @local, 0x400000}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000080)={0x1, &(0x7f0000000380)=[{}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:02 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:02 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:02 executing program 1: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:02 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x4ec441, 0x0) accept4$llc(r1, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r2 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016af248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r2, r5, 0x0, 0x8000fffffffe) 09:00:02 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:02 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 09:00:02 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:02 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:02 executing program 1: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:02 executing program 5: r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) request_key(0x0, 0x0, 0x0, r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x400c40, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d271f8efbd4ee5090c25c997ff0a8bc29bbf7280dc9868ae86149527679342108e794882c00009322ba7800584b4d96257b9f9e95000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f0000000340)=0x101, 0x4) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f0000000000), 0x4) 09:00:02 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 632.339514][T20941] encrypted_key: insufficient parameters specified [ 632.430911][T20941] encrypted_key: insufficient parameters specified 09:00:03 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:03 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x0, r3, 0x0, 0x8, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000048, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x8081, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x2) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:03 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:03 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:03 executing program 1: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:03 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:03 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 09:00:03 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:03 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[@ANYRES32], 0x4) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827d9c190b27c69e5828e171ba9bb325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae861495276"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:03 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, 0x0, 0x400c000) close(r0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r3 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r4 = accept4$bt_l2cap(r2, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r4, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) 09:00:03 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 633.472346][ T26] audit: type=1800 audit(1579424404.042:988): pid=21016 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16550 res=0 09:00:04 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0xa) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) accept4$llc(r1, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x800) r2 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12da7f7280dc9868ae86149527679342108e794882c0000000000cd26f4f4c16b137ddb5725d6547db9af25dd28d4d0d07ccfe6394cad2f91f0ca665a46678398a61950cb08a1391d"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x800, 0x40) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r2, r5, 0x0, 0x8000fffffffe) 09:00:04 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:04 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:04 executing program 2: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:04 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open$dir(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r7, 0x0, r6, 0x0, 0x81420000a77, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r9, 0x0, r8, 0x0, 0x81420000a77, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r10, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) write$binfmt_elf64(r3, &(0x7f0000000580)=ANY=[@ANYRESOCT, @ANYBLOB="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", @ANYBLOB="caa8f61b9c3fac0b14cd98270661a382e9062078bf5f7a58cff8ff128d78dc7b1c2c27de1e4f6056280c130f748a7f70aeee86e301571a741f890868c5b60eeaf8079f4025561244ae9334d78cf436da3320e3b124a8ef771c3cc492a40927e69a4c16d516ed663dfddc4a5abc98b8a0e0c4398cf5f04f0c15d0931fcd5e247af9e3fbd1d4b64305ce09e8f5f8c517080ccf5da78e8d03f3c8ca6770e111efdc0ec9dea69b0beda83488610e569517782491a856beb9bdbca8f61ad435dd403366503b09ec53851a31822b9398bedef9", @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES64=r0, @ANYRES16, @ANYRESOCT, @ANYRESHEX=0x0, @ANYRES64=r9], @ANYRES64, @ANYRES32=r10]], 0x10ef) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r11, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r12 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r12, 0x7fff) sendfile(r2, r12, 0x0, 0x8000fffffffe) 09:00:04 executing program 1: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:04 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 09:00:04 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:04 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:04 executing program 2 (fault-call:15 fault-nth:0): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:04 executing program 1 (fault-call:16 fault-nth:0): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:04 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x91) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 634.438536][ T26] audit: type=1800 audit(1579424405.012:989): pid=21086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16548 res=0 [ 634.535646][T21086] FAULT_INJECTION: forcing a failure. [ 634.535646][T21086] name failslab, interval 1, probability 0, space 0, times 0 [ 634.566141][T21086] CPU: 1 PID: 21086 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 634.574928][T21086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.584991][T21086] Call Trace: [ 634.588298][T21086] dump_stack+0x11d/0x181 [ 634.592669][T21086] should_fail.cold+0xa/0x1a [ 634.597341][T21086] __should_failslab+0xee/0x130 [ 634.602211][T21086] should_failslab+0x9/0x14 [ 634.606829][T21086] kmem_cache_alloc_trace+0x2a/0x5d0 [ 634.612141][T21086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 634.618441][T21086] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 634.623261][T21094] FAULT_INJECTION: forcing a failure. [ 634.623261][T21094] name failslab, interval 1, probability 0, space 0, times 0 [ 634.624360][T21086] alloc_pipe_info+0xf8/0x3b0 [ 634.624389][T21086] splice_direct_to_actor+0x4b3/0x540 [ 634.624455][T21086] ? generic_pipe_buf_nosteal+0x20/0x20 [ 634.624509][T21086] ? security_file_permission+0x88/0x280 [ 634.658480][T21086] ? rw_verify_area+0xee/0x250 [ 634.663267][T21086] do_splice_direct+0x161/0x1e0 [ 634.668145][T21086] do_sendfile+0x384/0x7f0 [ 634.672752][T21086] __x64_sys_sendfile64+0x12a/0x140 [ 634.677982][T21086] do_syscall_64+0xcc/0x3a0 09:00:05 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:05 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20, 0x2, @rand_addr="ed5c95bd216f5ed7d371af9575e29d8e"}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724106d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 634.682582][T21086] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 634.688489][T21086] RIP: 0033:0x45b159 [ 634.692413][T21086] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 634.712132][T21086] RSP: 002b:00007f4d58fcec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 634.720569][T21086] RAX: ffffffffffffffda RBX: 00007f4d58fcf6d4 RCX: 000000000045b159 [ 634.728936][T21086] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 634.736931][T21086] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 634.744925][T21086] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000007 [ 634.752905][T21086] R13: 00000000000008a4 R14: 00000000004c9d99 R15: 0000000000000000 [ 634.761789][ T26] audit: type=1800 audit(1579424405.152:990): pid=21094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16897 res=0 [ 634.771373][T21094] CPU: 0 PID: 21094 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 634.790946][T21094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.801043][T21094] Call Trace: [ 634.804428][T21094] dump_stack+0x11d/0x181 [ 634.808854][T21094] should_fail.cold+0xa/0x1a [ 634.813543][T21094] __should_failslab+0xee/0x130 [ 634.818426][T21094] should_failslab+0x9/0x14 [ 634.822968][T21094] kmem_cache_alloc_trace+0x2a/0x5d0 [ 634.828258][T21094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 634.834501][T21094] ? apic_timer_interrupt+0xa/0x20 [ 634.839692][T21094] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 634.845602][T21094] alloc_pipe_info+0xf8/0x3b0 [ 634.850322][T21094] splice_direct_to_actor+0x4b3/0x540 [ 634.855731][T21094] ? generic_pipe_buf_nosteal+0x20/0x20 [ 634.861299][T21094] ? security_file_permission+0x88/0x280 [ 634.866945][T21094] ? rw_verify_area+0xee/0x250 [ 634.871725][T21094] do_splice_direct+0x161/0x1e0 [ 634.876662][T21094] do_sendfile+0x384/0x7f0 [ 634.881148][T21094] __x64_sys_sendfile64+0x12a/0x140 [ 634.886356][T21094] do_syscall_64+0xcc/0x3a0 [ 634.890927][T21094] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 634.896817][T21094] RIP: 0033:0x45b159 [ 634.900738][T21094] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 634.920341][T21094] RSP: 002b:00007f9369ae6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 634.928797][T21094] RAX: ffffffffffffffda RBX: 00007f9369ae76d4 RCX: 000000000045b159 09:00:05 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 634.936771][T21094] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 634.944744][T21094] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 634.952720][T21094] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000007 [ 634.960692][T21094] R13: 00000000000008a4 R14: 00000000004c9d99 R15: 0000000000000000 09:00:05 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0xc040, @rand_addr="0f00b9161254787b526cf8bc7a0a9e8d", 0xfffffffe}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000400)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:05 executing program 2 (fault-call:15 fault-nth:1): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:05 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:06 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 09:00:06 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:06 executing program 1 (fault-call:16 fault-nth:1): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:06 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f00000002c0)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$RTC_ALM_SET(r5, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 635.495436][ T26] audit: type=1800 audit(1579424406.062:991): pid=21135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16961 res=0 09:00:06 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x0) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 635.758120][ T26] audit: type=1800 audit(1579424406.332:992): pid=21149 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16528 res=0 09:00:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:06 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:06 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, r2, 0x0, 0x2, &(0x7f00000003c0)=':\x00', r3}, 0x30) syz_open_procfs(r4, &(0x7f0000000380)='pagemap\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r6, 0x7fff) sendfile(r1, r6, 0x0, 0x8000fffffffe) 09:00:06 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 636.024505][ T26] audit: type=1800 audit(1579424406.592:993): pid=21166 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16538 res=0 09:00:06 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x0) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:06 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=ANY=[@ANYRESDEC=r3], 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffe) [ 636.190216][ T26] audit: type=1800 audit(1579424406.762:994): pid=21176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16961 res=0 09:00:07 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:07 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x0) sendfile(r1, r5, 0x0, 0x8000fffffffe) 09:00:07 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x800000000010) 09:00:07 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @rand_addr="0000e9ffffffffffffff00", 0x7fff}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:07 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:07 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x800000000010) 09:00:07 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) [ 636.951279][ T26] audit: type=1800 audit(1579424407.522:995): pid=21212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16541 res=0 09:00:07 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb97b949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) [ 637.034556][ T26] audit: type=1800 audit(1579424407.582:996): pid=21212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16541 res=0 09:00:07 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(0xffffffffffffffff, r5, 0x0, 0x8000fffffffe) [ 637.188262][ T26] audit: type=1800 audit(1579424407.592:997): pid=21226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16571 res=0 09:00:07 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:07 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x800000000030) [ 637.297072][ T26] audit: type=1800 audit(1579424407.742:998): pid=21230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16571 res=0 09:00:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x800000000030) 09:00:08 executing program 5: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x6) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) r2 = dup(r1) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r5, 0x0, r4, 0x0, 0x81420000a77, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r7, 0x0, r6, 0x0, 0x81420000a77, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r8, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYRES64=r6], @ANYRES64=0x0, @ANYRES32=r8, @ANYRESOCT], 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r10 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r10, 0x7fff) sendfile(r2, r10, 0x0, 0x8000fffffffe) 09:00:08 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(0xffffffffffffffff, r5, 0x0, 0x8000fffffffe) [ 637.579810][ T26] audit: type=1800 audit(1579424408.152:999): pid=21250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=16515 res=0 [ 637.714289][ T26] audit: type=1800 audit(1579424408.282:1000): pid=21260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16536 res=0 09:00:08 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:08 executing program 4: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='errors=recover,show_sys_files=no,disable_sparse=yes,umask=00000000000000000000000,dmask=00000000000000000000000,case_sensitive=yes,mft_zone_multiplier=0x0000000000000004,errors=r']) 09:00:08 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(0xffffffffffffffff, r5, 0x0, 0x8000fffffffe) 09:00:08 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x400c000) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x1, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9", 0x5b}, {0x0}, {0x0}, {&(0x7f0000000a40)="ea72e962eca6", 0x6}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb5c7557fd72976472d58f598bc5848a2b61039d2af3", 0x59}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732b96cc9381afd4c38244f49f84f883deba2a42f9540faff6715abfc", 0x6f}], 0x8}, 0x4000840) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x800000000050) 09:00:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) r2 = syz_open_procfs(0x0, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x8900) syz_open_procfs(0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, 0x0, 0x400c000) close(r1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') geteuid() r4 = open(&(0x7f0000000400)='./bus\x00', 0x1044142, 0x0) r5 = accept4$bt_l2cap(r3, 0x0, &(0x7f00000003c0), 0x1c1800) sendmsg$sock(r5, &(0x7f0000000c40)={&(0x7f0000000200)=@sco={0x1f, {0x2, 0x3, 0x0, 0x6, 0x0, 0x40}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000007c0)='B', 0x1}, {&(0x7f0000000c80)}, {&(0x7f00000008c0)="88acdcf0f733021e79adec5451ba7e5af839f59b66e90c1cf6fda7204276457a8adebbec4edbec7112c02467f7b387c75b5afa3f216551248eb2c4f4ed7340e67a12e75814346e3ed6ed9c7cbabf31662abfff9be621ea6ac79af9e3b7fd9af8e03cb60f971acd4c4c7d820488359af90be7dc6839629a04757b4197f321f758565ed8237d1e98dbc9b38ea3fee8d2c3224bf43dd8ebb7e9305e99439114ed6038ce2acde65e5ce287ff732e85779daf14622bcb5d", 0xb5}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000a80)="ba7e9b8954b58eacbb5aa1abac3524c01ffaa77eb79ba91020656879cf6392909f3cb0ff40d2d027fbc6fce4c6228bd3f4fd1f0f35627e97eb60353490105d168a3994cb", 0x44}, {&(0x7f0000000b00)="362bc6066270a2d2619e3a4a838487211660fe0a51c1afa216601153186ee8cfd0509cf997f9de5d63833497a8b44ee25abc03443f86801dcfef1b01a7221f1c7653becde63739ab99b930b29a88b34a41186732", 0x54}], 0x8, &(0x7f0000000c00)=[@txtime={{0x18}}], 0x18}, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r1, r4, 0x0, 0x800000000050) 09:00:08 executing program 0: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x10, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[], 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x81420000a77, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f00000002c0)={0x1, 0x3, 0x401, 0x2}) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x9) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r4, 0x7fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) 09:00:08 executing program 3: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x17) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000200)={0x2, &(0x7f0000000080)=[{}, {}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000010d746407dcd2154e75ff070000243bc62740f21089ab6b83a23e4d8aa4e31bf9801b8817ddc161a7d22fe04fbdcaabb984949b050038cc789c58b8a6e10d7b86e04e3827325dff77e63c0f76554a61df69d089269c38e2150b084016f7e4b65400000000b7d617b08baf248fcc57d0c313cfacb0bf5a92b45c4724236d65e12d27f7280dc9868ae86149527679342108e794882c0000000000"], 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x1, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff}) splice(r4, 0x0, r3, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) [ 638.441151][T21253] ================================================================== [ 638.449294][T21253] BUG: KCSAN: data-race in pipe_wait / put_pipe_info [ 638.455958][T21253] [ 638.458287][T21253] read to 0xffff888120aa1e90 of 4 bytes by task 21262 on cpu 1: [ 638.466015][T21253] pipe_wait+0xd7/0x140 [ 638.470272][T21253] splice_from_pipe_next.part.0+0x89/0x1d0 [ 638.476081][T21253] __splice_from_pipe+0xb8/0x4a0 [ 638.481018][T21253] splice_from_pipe+0xbb/0x100 [ 638.485796][T21253] default_file_splice_write+0x45/0x90 [ 638.491378][T21253] do_splice+0x6db/0xc40 [ 638.495704][T21253] __x64_sys_splice+0x20a/0x220 [ 638.500559][T21253] do_syscall_64+0xcc/0x3a0 [ 638.505074][T21253] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 638.510950][T21253] [ 638.513283][T21253] write to 0xffff888120aa1e90 of 4 bytes by task 21253 on cpu 0: [ 638.521073][T21253] put_pipe_info+0x4d/0xb0 [ 638.525511][T21253] pipe_release+0x115/0x170 [ 638.530025][T21253] __fput+0x1e1/0x520 [ 638.533997][T21253] ____fput+0x1f/0x30 [ 638.537965][T21253] task_work_run+0xf6/0x130 [ 638.542466][T21253] exit_to_usermode_loop+0x2b4/0x2c0 [ 638.547739][T21253] do_syscall_64+0x384/0x3a0 [ 638.552318][T21253] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 638.558196][T21253] [ 638.560515][T21253] Reported by Kernel Concurrency Sanitizer on: [ 638.566667][T21253] CPU: 0 PID: 21253 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 638.575333][T21253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.585492][T21253] ================================================================== [ 638.593654][T21253] Kernel panic - not syncing: panic_on_warn set ... [ 638.600409][T21253] CPU: 0 PID: 21253 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 638.609069][T21253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.619257][T21253] Call Trace: [ 638.622548][T21253] dump_stack+0x11d/0x181 [ 638.626881][T21253] panic+0x210/0x640 [ 638.630843][T21253] ? vprintk_func+0x8d/0x140 [ 638.635434][T21253] kcsan_report.cold+0xc/0xd [ 638.640021][T21253] kcsan_setup_watchpoint+0x3fe/0x460 [ 638.645399][T21253] __tsan_unaligned_write4+0xc7/0x110 [ 638.650787][T21253] put_pipe_info+0x4d/0xb0 [ 638.655216][T21253] pipe_release+0x115/0x170 [ 638.659726][T21253] __fput+0x1e1/0x520 [ 638.663710][T21253] ? put_pipe_info+0xb0/0xb0 [ 638.668293][T21253] ____fput+0x1f/0x30 [ 638.672263][T21253] task_work_run+0xf6/0x130 [ 638.676775][T21253] exit_to_usermode_loop+0x2b4/0x2c0 [ 638.682071][T21253] do_syscall_64+0x384/0x3a0 [ 638.686674][T21253] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 638.692570][T21253] RIP: 0033:0x414cf1 [ 638.696488][T21253] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 638.716256][T21253] RSP: 002b:00007ffd48546760 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 638.724779][T21253] RAX: 0000000000000000 RBX: 000000000000000f RCX: 0000000000414cf1 [ 638.732797][T21253] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 000000000000000e [ 638.740765][T21253] RBP: 0000000000000000 R08: ffffffffffffffff R09: ffffffffffffffff [ 638.748728][T21253] R10: 00007ffd48546840 R11: 0000000000000293 R12: 000000000075c1c0 [ 638.756696][T21253] R13: 000000000009bdce R14: 0000000000761818 R15: 000000000075c1cc [ 638.766198][T21253] Kernel Offset: disabled [ 638.770532][T21253] Rebooting in 86400 seconds..