program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:18:30 executing program 2: 18:18:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 18:18:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, 0x0, 0x0, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:30 executing program 2: 18:18:31 executing program 2: 18:18:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 18:18:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, 0x0) 18:18:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_misc(r3, 0x0, 0x0) 18:18:32 executing program 5: unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)="662f651e93b2fe337fc075b805856ec68a83f474", &(0x7f0000000280)=""/194}, 0x20) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() 18:18:32 executing program 2: 18:18:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 18:18:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 420.901337][ T9584] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 18:18:32 executing program 2: 18:18:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 18:18:32 executing program 5: 18:18:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) io_submit(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_misc(r3, 0x0, 0x0) 18:18:32 executing program 2: 18:18:32 executing program 5: 18:18:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 18:18:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:33 executing program 5: 18:18:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 18:18:33 executing program 2: 18:18:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:33 executing program 2: 18:18:33 executing program 5: 18:18:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 18:18:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_misc(r3, 0x0, 0x0) 18:18:33 executing program 5: 18:18:33 executing program 2: 18:18:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) socket$netlink(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 18:18:34 executing program 2: 18:18:34 executing program 5: 18:18:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:18:34 executing program 5: 18:18:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 18:18:34 executing program 2: 18:18:34 executing program 5: 18:18:34 executing program 2: 18:18:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 18:18:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:35 executing program 5: 18:18:35 executing program 2: 18:18:35 executing program 3: 18:18:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:18:35 executing program 5: 18:18:35 executing program 3: 18:18:35 executing program 2: 18:18:35 executing program 5: 18:18:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:35 executing program 3: 18:18:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:36 executing program 5: 18:18:36 executing program 2: 18:18:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:18:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:36 executing program 3: 18:18:36 executing program 3: 18:18:36 executing program 2: 18:18:36 executing program 5: 18:18:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:36 executing program 3: 18:18:36 executing program 5: 18:18:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:37 executing program 2: 18:18:37 executing program 3: 18:18:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:18:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:37 executing program 5: 18:18:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:18:37 executing program 3: 18:18:37 executing program 2: 18:18:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:37 executing program 5: 18:18:37 executing program 5: 18:18:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, &(0x7f0000000e80)}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:38 executing program 2: 18:18:38 executing program 3: 18:18:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:18:38 executing program 5: 18:18:38 executing program 5: 18:18:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:38 executing program 3: 18:18:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x105, 0x1) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 18:18:38 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000100)=0x8001, 0x4) 18:18:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x105, 0x1) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 18:18:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, &(0x7f0000000e80)}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:39 executing program 5: 18:18:39 executing program 3: 18:18:39 executing program 2: 18:18:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x105, 0x1) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 18:18:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:39 executing program 2: 18:18:39 executing program 5: 18:18:39 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x80045503, 0x0) 18:18:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(r0, 0x0, r1) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:39 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x802c550a, 0x0) 18:18:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, &(0x7f0000000e80)}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:40 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0xc0185502, 0x0) 18:18:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x80045518, 0x0) 18:18:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(0xffffffffffffffff, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:40 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f0000000100)=0x8001, 0x4) 18:18:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(r0, 0x0, r1) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:40 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000100)=0x8001, 0x4) 18:18:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(0xffffffffffffffff, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:40 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_RELEASE(0xffffffffffffffff, 0x6431) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) 18:18:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000b00)="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", 0xfb}, {&(0x7f0000000c80)="5be452df1dcbdf0f193fc455345cf74bb7dd165e1cd95aba4433f8fa704ede7b810ef1de148a740601cf8308c411658bec581e38b607751dd68f03f64433b4c5407297dcfcd298c1cd6642bbc6af29253bfed8d2ee5edf5e68975f2be720975a4d601fff0e2aa13a8763b43897720f252bb1828d113e6107b8e6a28ae8166f4c2fbd8abac9916c6d433cdd631203126e880ecc103735eaf8c055f0d832d75bd92f9522405068b8a6c870f7eae0423b3cabcdd30e0ad60e3272323e0c6152ad598ae994c179728df7e5a0666e8c818129d7b416ff56c1ade1b42fdc1cb3e7d0f5c9890728ac7d20d21f2c490acbdfb13beed45e568b30c7", 0xf7}], 0x2, &(0x7f0000000180)=[@ip_tos_int={{0x14}}, @ip_ttl={{0x14}}], 0x30}}, {{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000280)="e745c4fd665fd293977f194c2f055673329fcb6df7c7319b9949d9924064289e7e63d8ae65f8932d97eeeb968f509fbb36872b0315125b648de8bbd55b6a33978de9bc7148dc3f3581d891f5acb928f2bfd9d87a21760169e14c0f8e22d83e9efa571e877fc03809380b3d78ee660660829221", 0x73}, {&(0x7f0000001040)="31b0b82a3d7b9bcfe48e50791562de0dd2c8fc24b90020a28558ab94997db8a28b16c4fda184b7b1181d2a80ca4f6606576d3b11dd56a0dc324801080807ce3872d856d06d90ca0cc287024f60200eba0bc70acca85a2b1d26111c1712e073f2ceef1fa3370e3dbe36b4430dfcdab812c6ba5bf348a80077c5b3561d86007c8bcc120b3b84c96c416705c6e6a0d4abe06c0d0a1f3c0e54d425ff1fc5b96289fb838a3f7a6a3c15f03024c96be966b841a3d42443908f25c3481186a4273f5f6a62584332910fc84a930d0fe667c722bf09c1e94e87435da095d14d07e118", 0xde}, {&(0x7f0000000200)}], 0x3}}, {{&(0x7f0000000400)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000001140)="1ad3aeedd9d2a096709e4d93ac113e47716fca71e81d0d861b17e8b72e47140a9ec528c2053f55d575eacf9b95e68766625d4b08d5b9d57b90747975a35c0a1c17dcff3dc2da18b085056598dd4c64ba5414cabb102e34b850c58416b8d725776c96ab9e719c8fdd9874d5597639eb96088038142f859bef400205240a9bf7642e96688c9fe72c70da531622139a1119f762a6f5915a32ce4f99d6e91a6ef7fcab4dc958743f2abe40a2e680971722afba43b281a0ee91169ffbd94bec5b1f6cf20d", 0xc2}], 0x1, &(0x7f0000000680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@noop, @ssrr={0x89, 0xf, 0x0, [@multicast2, @broadcast, @dev]}, @end]}}}, @ip_tos_int={{0x14}}], 0x60}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000600)="044877282e53dc1aad17b08be441fc1a241b", 0x12}, {&(0x7f0000001240)="6d671ccd47b9ebb95212c5883898299e353b7e43a08fe72da5519deb331fe27fa5d17303a37e3e3653127e76873114aa6ca82d8b92408f551c24e14fda4b7df956c585317ee35ab5d7575b4a59d8e88e3d70d5553acbc0b5965cdc3e2a13ea007dae543373f55bfbe724b3d47a9db06171f912765a8d1b612cccaeac3e3e7a57c603c58e53a87c4cc1e956ee4d32c8488e27006a3bed4b4063affe98286a4128f0a656ab3903be335019b9944de5c908acb228f14240d5cb5fc994816283e58f1b7c82fb99dda2a650f108751ac6b679c443", 0xd2}, {&(0x7f0000003f40)="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", 0x1000}], 0x3, &(0x7f0000001340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @empty}}}, @ip_tos_int={{0xfee6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}, @ip_retopts={{0x68, 0x0, 0x7, {[@generic={0x0, 0x6, "abe6f8c9"}, @ra={0x94, 0x6}, @ra={0x94, 0x6}, @rr={0x7, 0x7, 0x0, [@multicast2]}, @lsrr={0x83, 0x186, 0x0, [@local]}, @lsrr={0x83, 0xf, 0x0, [@empty, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @rr={0x7, 0xb, 0x0, [@dev, @multicast1]}, @ra={0x94, 0x6}, @ssrr={0x89, 0x17, 0x0, [@dev, @multicast1, @remote, @loopback, @remote]}]}}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @empty}}}], 0x128}}, {{&(0x7f0000000780)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000017c0)=[{&(0x7f0000002a80)="598636270dda210c7c8da529d2eb7149a9963f68c8974097621383c62eb0ce137547a5522fa6707f7546594fa2d65af752f0557b2ad7e6ba849fdb14720b506e1f24e97ee2e23a0dcf78b7c39ada7ca6d58be037b1ffe2d7122766c6f7a09b6e8df00b6a1738d48b7a4ee68eb573d3869a594d5db6aa700dce9a87a072b3c3ad4087c756639ef48e2c4b12acfdfa93bce867b388297b05053240", 0x9a}, {&(0x7f0000004f40)="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", 0x1000}, {&(0x7f0000001480)="2e03500e3b0f075c570486343a72bd9b2f7444d40832cbbbf301b32d6af58bffffee38639c48cc574ee5b070b2efe76fbe8db9ba57bf53fb0c67ce5913d97a06f3d70cba5d681b1cc8df442700fc1746e82b72b441c85bdc9de5a948f49fc92addf521e53fd59ea4857216185e13421cc7040bcca19c8e60e9efb74804a2f81a44f72365eec54e528e43385030a5dd33a57e48b8522c04954dfc5294cea01e36a2db1d0d2a28d1f1c35c0e5870837b4a2cfa0735695068895700a019dafcde61856412860dcbe2503ed0b5bd88", 0xcd}, {&(0x7f00000007c0)="b9ac0cc7ab881a37a56cf9864c0c68674a2c1c6e2728b74136fc6166805e440796ff1e34c8da23c551c324dc1584ed2bc292ada3618ac37ae0b1195842bd3392a8a14bc5721be23ad48aedab52c1534f145b231912e43e7a2d8abcaa9b", 0x5d}, {&(0x7f0000000980)="39eaa819a6376a2bb5e31359a2729ead75b958195bad468e0b2f88dd8a1fc2c7d177bc6f503f0d87c2c62e26e5b70293e21f0a588da45c204b248b7d80a01c6efd21ea192100d67be627eb7cf9acdf9809c51d5c184fc34e1be1eb1e911ebdb2aaeac3372736ba27adfb9c4dd6d2d2293ddfd4d2c1ddfd9fc9ffb5b15e94bc", 0x7f}, {&(0x7f0000006c40)="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", 0x1000}, {&(0x7f0000001580)="550c50988d2a0dcfbb55b7c110e00ec97673b9196a847746fee790ed3843c434c99163d2535ade2904b36fff3ae564c775dbbfb504f289ff50193ec5128bd25e7c8a0d3d90015ac531f6a6b5ff88f45496d80af663397b344fc15afb141a682d9e9cdf84685622707198f494121c284fc3f6bd7585f47f8deb013f9f66b96ffbe7ee", 0x82}, {&(0x7f0000001640)="5e21bb918394b4810044406ebe6e386b1d4f84321085b9d61c80209749777fef5c01370c9be4e1a8f7a213a121e67e6eaf59079486b693f217cffc7673821d6c52092a3a595539d80c1eb8b004e0d650c3d831a828cc3da1ed5c81daa99a007e3f8363b3f21204def0dd1099a172a19d0ebc18e9831488edde9a63cc014355e1709fd53f8e0e6ac1a62ad35660e592c13b1457bfe013e968e3e1b0be025929497de9058e3d8a25ee4d064cbdc5b054aea6bb91f73c9761bde263172bb375c834ce370045ca330197c9757cfa1b60d5123c73094ddf172ba43f3dda201dc4a56d9d", 0xe1}, {&(0x7f0000001740)="922a6cf18a9f95df8650498b89a6a0c432aae79e52d22747fc36090e3881bcd8b06471f522ae69bdec02f69bd854160844571607269a6c6ecaf59b623139be2d82233a4fb638d9beace8441f1782d47ae3a381b91554e4b02c9c41954d21f512", 0x60}], 0x9, &(0x7f0000001880)=[@ip_tos_int={{0x14}}, @ip_tos_u8={{0x11}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}, @ip_ttl={{0x14}}, @ip_tos_int={{0x14}}], 0x78}}, {{&(0x7f0000000a00)={0x2, 0x0, @local}, 0x10, &(0x7f0000000a80)=[{&(0x7f0000001900)="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", 0xfb}, {&(0x7f0000001a00)="e555fd0af461616281f5f0576901b9c8007ba354736c54d70fd5bd4f5ca3a89a0e392d81a9f508b25a05e57bbf555de9239da38416995b02c8c1688bce8d87bbcbbebe19f706103c9f4974ea5b9ab01873d6445c7448ca44a049e09f28f5ee5275a5111fe9a4f0b644c55a01e495e89d54e478ccdbb8a32c6edd742a1378cb1072ed", 0x82}, {&(0x7f0000001ac0)="63c7b5a70380ad13ea72204a166db0b5027c2ed797074a5efbaae7eb95efc7301b45fb78cee60934997d9c09170d4172447b4554a03dcf6bffeb6424da9d96dcd69b4e091e2df6b9b6c61baaf46fc1f54dc35dc6e7bbda41e24c26185617076f09ab141177b15ab7d2b2bd5cc24c5d927e08971c2b82751eef43c7c158711bb1651251e134c82bfc9aadaea520a4b443cd1f0d4bc61508da3e7c9d6b8135b9a8571d8074516b0a7152b55f6e38df7d44d5037b6ec6bd666ea603125c3a52069d43c389916e4e638540ee24e2ba32fee31110863d9ab13f9787b64a13d0a69d0f2a712293414d7cb33b4c948edf", 0xed}], 0x3}}, {{&(0x7f0000000c00)={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000d80)=[{&(0x7f0000001bc0)="5978daa08e4337d2d109a7764c2d9e898d407f6811ac53dbb7aa384b4486b6ada5e2583024716903e44f2e5bc60b2be330ebe51cb5730a12a6b343dff7542fc9f38d3ecec5f942a05ddb9b5fef054ce5509f90247585384712da9c76b69a0ea424805e7406b66a8b258ced378059fc231b21b70cb2c64c7349928aa8c832d3bf14ddbd72d3c1af237913a4fcf2c118f76d96e2aa8b123a09a691851a352cdd755d981a43bd3e9c615890ceaceb16201f171ec0328b23968780e57e4906b6a91bf3c9efef38620b9096a1f211457b50514ca9252f5cef8b312ae2b2c3", 0xdc}, {&(0x7f0000001cc0)="c526604573927c2ef21a40514fb6c5b724190a630281f85191a91f5bd65bcebb6029ffb8dad6de15ea3bda815c86ea0c50f3f2d4dd6950acc3a15e9163420bebb8809450bc085b213e36525b51be1aca1321edac9cd16e52092bd93e80d16c1c4bccd5db9c617bcd0bf63c9be133dccdfca5ab316a3da26e6cb4d5a6abd1dd0d58d3b36745cc7906e55bfd4cbdc1cd08be5a26fc8c4c9ebdb4ea2137d4221549c4533666b28580ac56a7e31026b2e0401431585902c773ff7f8f79fe0921cc5fafd4443230b4a93f31c35c58a0c5299c9e6aaa5c770aa5fa76a33bddf5c441", 0xdf}, {&(0x7f0000002040)="21c9d44403d4f13f53973ba5c90306ad71d1860c64e580af86e5bad39dec6b02b2bb771190b8b72dc58f6169f41e9408f48052bf589137cd58bceeba38fb70cc7127e476d3635c03fcd4bb4493ad39a4fe0234499c9b7b58e2dd93b8c03d12ee37b65d6ed79f0f49e24db545fc3dea9b91a4d7f9a30c60d5be09a6648ec068224c5fcf3013bbcfbc6726d20eb0eb26", 0x8f}], 0x3, &(0x7f0000002100)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_int={{0x14}}, @ip_retopts={{0x50, 0x0, 0x7, {[@end, @end, @ssrr={0x89, 0xf, 0x0, [@broadcast, @empty, @dev]}, @generic={0x0, 0x2}, @rr={0x7, 0x23, 0x0, [@remote, @multicast1, @empty, @broadcast, @remote, @multicast2, @broadcast, @loopback]}, @timestamp={0x44, 0x8, 0x0, 0x0, 0x0, [{}]}]}}}], 0xb8}}, {{&(0x7f00000021c0)={0x2, 0x0, @dev}, 0x10, &(0x7f0000002780)=[{&(0x7f0000002200)="ec3ee4806add3d75b482b3bed44211fd7a841b91f53bc9cb7c3468a0264027225c286dc25782530d9f51d855889ded1f97e7eacd52af4ac7ed97cf07ceeab616031dda4e029d4804c89d1a891b6079b2f6c1e684d7306f4d65f1762a6ca3e8c499fb5066e0ec0e128acafa9de5cdc43f0253d354008ba2e3bba7c62f140b3e2180e6f6cfa29b2d8196351face644e070f7d14a1e064045167001f1f1adc01b073439e663c9", 0xa5}, {&(0x7f00000022c0)="6717b6fc608285ffa813a5619410facf29f9c91daa7ed1f0f9d7d32f7c6c502d3c42b6947a4a68fa3366f5bcad8838c06d37873830d03cc7561a80b560a6982dfb26273b7330fa7ae7726c0c792e55", 0x4f}, {&(0x7f0000002340)="43b13c6b0d01da893e643de58cd8f74ae98cf86cce0d36da86b6520f762824b7aeb74458ec35a1f851be337dbefcde582faf552e1416d8213bcc2ebe23f554bfb18ba948474b2f2e94c72d9ec66667ff04bbf0c965c34274833bbed3332199aabb2479c0003eb02f2e1851772c93de1e614146c9189b98eaefa9c9a0af237dffbb4956294a9515fe123067c4e2bffc0b36b2e273bacabe03391f24f4c5035677f0f0b5aa82aaf0f7550ec8b7ed18786954b8efb5834393b29199ecf19b72a2da466b2325d62bfe5d718ae677d5", 0xcd}, {&(0x7f0000002440)="42214f0bbdbc743724aa0f292bacf5af632fdf8e27b5145d7e13bbcc3dcd90ad56da3f0773db7913db237c88523b1348859e986831fb0cd7440b55b3ee1dbfe6456ec3f36501e580d4f4581dbe89c0c0df2e8170625d90a64a08afb2e92ab543d742696191eb572463eae0556a66", 0x6e}, {&(0x7f00000024c0)="99c2e2516a65d6ed9e1f7710c99dd45ad938c9f0743fa595ecbfc9b933a22d1a7657506f510227f5ed18fc48e7a44d698f668abe7bc3cbc023541b42a9c746be87826eec74c306ad462b1cad4f75565444e74349e27dffcb64e0b28ccf56cb13059d9889bee898523bbd6cf88da170010c512f5c786bd67c2d3e3805520aef93c05bd77a1d3ee3197286fa04263c9c772b38e765d97fd2b27216895b90a4309e572c8e2d3da36b06c6453daac2e2145b4973c0ff1f875e7c855300e3adce81", 0xbf}, {&(0x7f0000002580)="5b0ea7156077a5039ed8ba52c945e5201d68da0eb238d81b4f8318178804f0ed95e45fd9b8b05060a84afbcb77545a78e96a95c48662f891e77356623c7c0813a628e805d7d9c4907882668de05833c9bc5d39dcd1e367cd75b06197e185974445cbcbfd7e0ad3d24ca1b17e8cba13e3255da52b89dd47fc8f246d9f5305aee752c05f741589f4a012172002f6f613b69684c495ffd3db054e11", 0x9a}, {&(0x7f0000002640)="e1fe8d2f8f781012c7f903a618f3ce5b8703ce025ccc326bd4100ff18e92385c947acc526e0d", 0x26}, {&(0x7f0000002680)="cea46bcbe3706b31da8a737312082e8ce212361d8126f8e6ce55837d7ad791021936f848579cdae380cae658eb41dc8b2aba0b41013ad20411f3f66aef17dc6c453c40195c1623398eb91e9ea159a6fa63969f107b949935680bf7496638803c1f50f14ced8759aa53fcaa515996fd63bf7a8c553faa2ea633e99f9e7ff343991dc5ceb40303b917bc0f8682a1fce0fa564ce3b496ae137ff09bfbb8691020dd381abc927048dd4f498baa47b04cd17262f090d662715eba3b834582ed4b76918dfae5b9dab176956f0f793d1783d8ff69490b79d13dc190b9f60701ea9b839ef2531518afd769ff19c87ea3cf1ea6", 0xef}], 0x8, &(0x7f0000002800)=[@ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_u8={{0x11}}], 0x50}}], 0x8, 0x600d054) 18:18:40 executing program 2: write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = gettid() clone(0x3fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) wait4(0x0, 0x0, 0x0, 0x0) gettid() sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:18:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(0xffffffffffffffff, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) [ 429.409475][ T9877] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:18:41 executing program 2: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x20008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, 0x0, 0xfffffffffffffe91) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="14000000000000002900000000000000140000000000000029000000340000007f00000000000000000000000000000014902adc384eb9ad25349cf28fdcc957a361e48ad9ed33b6f31cbfc598130063748490a34730fb2d93e2272ba1f5497be81a44f75c0b040e0142dfcd271ef6a3c0ee70cc086727249f6c854c1a56ff6234e758956ad8af"], 0x87}, 0x48000) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fsetxattr(r1, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000100)='user.syz\x00', 0x462, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='user.syz\x00', 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x4182) r3 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) syz_open_procfs$namespace(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r4 = dup2(r3, r3) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f00000001c0)={'ip_vti0\x00', {0x2, 0x4e20, @empty}}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) 18:18:41 executing program 0: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 18:18:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, &(0x7f0000000e80)=[{0x0}], 0x1}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(r0, 0x0, r1) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) [ 430.075047][ T9899] input: syz0 as /devices/virtual/input/input7 18:18:41 executing program 0: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:41 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) openat$zero(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00', {}, 0xfffffffd, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2479], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 18:18:41 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x400000000000002, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000980)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 18:18:41 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) [ 430.464065][ T9921] input input9: cannot allocate more than FF_MAX_EFFECTS effects 18:18:41 executing program 0: r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) [ 430.527681][ T9926] input input10: cannot allocate more than FF_MAX_EFFECTS effects 18:18:42 executing program 5: r0 = socket(0x2, 0x4003, 0x0) setsockopt(r0, 0x0, 0x7, &(0x7f0000000140)="01003f8a", 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket(0x2, 0xc003, 0x0) connect$unix(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x10) dup2(r2, r1) setsockopt$sock_int(r1, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r3 = dup(r1) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) 18:18:42 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0x105, 0x1) write$binfmt_misc(r0, 0x0, 0x0) [ 430.681173][ T9928] input: syz0 as /devices/virtual/input/input12 18:18:42 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) 18:18:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r3, 0x10, 0xffff, 0x4003f8) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 18:18:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, &(0x7f0000000e80)=[{0x0}], 0x1}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:42 executing program 3: semget(0x3, 0x1, 0x0) 18:18:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000000)={@ipv4={[], [], @local}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c00082, r2}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="1cd7cb30ef66da0e3578d092d7ae7300"}, 0x1c) 18:18:42 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:42 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ftruncate(r0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') preadv(r1, &(0x7f00000012c0)=[{&(0x7f0000000040)=""/176, 0xb0}], 0x1, 0x0) gettid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc08c5334, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 18:18:42 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000000)) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)) r1 = getpid() tkill(r1, 0x9) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000280)="1c0000001a009b8a14e5f4070009042400000000ff00000000000000", 0x1e5) recvmmsg(r2, &(0x7f0000002ec0), 0x40000000000006d, 0x2, &(0x7f00000001c0)={0x77359400}) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'syz_tun\x00'}) [ 431.354221][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 431.360083][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:18:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup3(r0, r1, 0x0) 18:18:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:43 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0x105, 0x1) write$binfmt_misc(r0, 0x0, 0x0) 18:18:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000002c0)={{0x2f, @multicast1, 0x4e20, 0x0, 'rr\x00', 0xacb7547fec5ea43e, 0x7, 0x54}, {@loopback, 0x4e23, 0x0, 0x6d2, 0x0, 0x3}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_genetlink_get_family_id$ipvs(0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) mlockall(0xc0dab7ff8af52145) inotify_init1(0x0) alarm(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x314ded03e58e6f5c) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e21, 0x2, @loopback}, 0x1c) sendto$packet(r4, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) 18:18:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000003640)=[{{&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 18:18:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000054c0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, &(0x7f0000000e80)=[{0x0}], 0x1}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:43 executing program 5: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a000000010000001d09"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r1, 0x402c542d, &(0x7f0000000100)={0x0, 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) 18:18:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) [ 432.527871][ T25] audit: type=1804 audit(1572373123.857:34): pid=10007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/" dev="sda1" ino=2333 res=1 [ 432.602827][ T25] audit: type=1804 audit(1572373123.927:35): pid=10015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/" dev="sda1" ino=2333 res=1 18:18:44 executing program 2: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:18:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:44 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0x105, 0x1) write$binfmt_misc(r0, 0x0, 0x0) 18:18:44 executing program 5: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a000000010000001d09"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r1, 0x402c542d, &(0x7f0000000100)={0x0, 0x0}) socket$inet6_udplite(0xa, 0x2, 0x88) 18:18:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 433.085165][ T25] audit: type=1804 audit(1572373124.407:36): pid=10024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/" dev="sda1" ino=2333 res=1 18:18:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000002c0)={{0x2f, @multicast1, 0x4e20, 0x0, 'rr\x00', 0xacb7547fec5ea43e, 0x7, 0x54}, {@loopback, 0x4e23, 0x0, 0x6d2, 0x0, 0x3}}, 0x44) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_genetlink_get_family_id$ipvs(0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000140)={0xa, 0x2}, 0x1c) socket(0x0, 0x0, 0x0) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) mlockall(0xc0dab7ff8af52145) inotify_init1(0x0) alarm(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x314ded03e58e6f5c) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e21, 0x2, @loopback}, 0x1c) sendto$packet(r4, &(0x7f00000000c0), 0xfffffffffffffd4d, 0x1, 0x0, 0x44) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) 18:18:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:44 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000000)=[{r0, 0x160}], 0x1, 0x0) dup2(r1, r0) 18:18:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:44 executing program 5: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a000000010000001d09"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r1, 0x5407, &(0x7f0000000100)={0x0, 0x0}) 18:18:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) [ 433.732279][ T25] audit: type=1804 audit(1572373125.057:37): pid=10063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/" dev="sda1" ino=2333 res=1 [ 433.830396][ T25] audit: type=1804 audit(1572373125.157:38): pid=10066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/" dev="sda1" ino=2333 res=1 18:18:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) read(r0, 0x0, 0x1b4) sendfile(r4, r0, 0x0, 0x100100000000) 18:18:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) 18:18:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:45 executing program 3: ftruncate(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') preadv(r0, &(0x7f00000012c0)=[{&(0x7f0000000040)=""/176, 0xb0}], 0x1, 0x0) gettid() process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 434.209868][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 18:18:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$security_selinux(r0, &(0x7f0000000040)='sd\x1c\aB\xa0\xbfx\x00\x00\x01\x00', 0x0, 0x0, 0x0) 18:18:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:45 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4}, 0x4) r1 = socket$inet6(0xa, 0x80003, 0xdf) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") syz_emit_ethernet(0x3e, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d8652b00083a09000000000000000000000d00000000aafe80020000000000000000000eb94d0e3700907800000000"], 0x0) 18:18:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:45 executing program 5: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a000000010000001d09"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r1, 0x402c542d, &(0x7f0000000100)={0x0, 0x0}) 18:18:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = epoll_create1(0x0) dup2(r4, r3) recvmmsg(r2, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x0, 0x0) [ 434.776945][ T25] audit: type=1804 audit(1572373126.107:39): pid=10109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/" dev="sda1" ino=2333 res=1 18:18:46 executing program 2: r0 = socket(0x11, 0x803, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000200)) [ 434.910033][ T25] audit: type=1804 audit(1572373126.237:40): pid=10109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/" dev="sda1" ino=2333 res=1 18:18:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000004c0)={'dummy0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev, r1}, 0x14) 18:18:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:46 executing program 2: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x3}, 0x76) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='smaps\x00zJ\xf9\x7fE^0\xed7\x9a\xef\xf8\xc2^\rMq\xdc\\\x1eR^B\xcc\xc34k\x01\x8b\xeb\xf7\xc0Z~.\xb2\x1b-Z\x94\xe1\xcd{\x90\x01\xeb\xef\x1dm\xa6\b[\xe4=^\xa3\nR\xeb\x8coV74\x80g\x06\xe1\xd3\xeev\xb9\xef\xd1;\x96\x9bj\x9c-\xd5 \xad\xd5\xc6\x96\xaf3\xd1qG\x9f\x05\xfe\x92\xc8\xc4\xed\xa18\x90\xa0\xac\xfe\xaf\xda\x1bS\xcf\xc1\x9e\x81}F\xcc\x85W\xc9\\\xe8\xe0\xe2\x19!^JP\x19}R\xd8\xf5\x88\xf6\x9c\x82\x9c\xec\xce\xe390\'#\x9a\xad\x96\r\x02`d\xaa\n?%\xbe\xa4X\xd5P\xdc\xe0\xaa\x8c&\xc8O&\x1d\x17\xd8AyaM\x00\x00mh\x8e!\xdf\xdc\xd8;\xe3hc\x1f\x8b\xd4\x8b\xcc_\xaa?\xfeI |ulZ\xe2-\xc5HT<\v\x1b\xcfT\xb2\xaf\xb8\xb7\xc4<6\xcf\xb3\x8e\xceG\xaa\x12\xc3\xde\x00;\xc0D](\xeb\xb9\xd9iV\xebA\xd2\x92B\xc3\x02\x85C\xf9\xfc\v:\x1c\xbd9\t\xa8\xe6c\xd8\xcb\x8aK\xebe\xfe-\xf9D\x1f\xecq\x95\xd7\x9f\xd7Bs\x14\x88C\x8f\xb6\xebp1\xb1\xdbR\x00\x00\x00\x00\x00\x00\x00\x00') r2 = memfd_create(&(0x7f00000009c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\xa9u\xd6\x03\x16\x9d\xb3j\x05\xed\x1f\xa9\x19\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9\xbf\xefo\xa4\xcb\'\n>\xa1\x9c\x86x\x1c\x9f\x84\x195\x82\x17w|\xdb6\x90\x15\xb4\x0f\x06+L^l\x17\x8bX\x939\x1b\xdf\xfd\x8bF:m\x9e\x82]6#sf\x01\x02\x05DT\xfd{\xd7\\\xea\x06\xc4\x87\xe3R#.`\xc0\b`\x14\x96\x83l\xf7*\x82\xf5\x8d\x12\xc5\n\x8b\xba\x93-\x84\x01W\xecX\x11|\x897e\xb9\x1f', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2000000000011, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x400000000088001) 18:18:46 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x40003}, 0x8) close(r0) 18:18:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:47 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)) dup3(r0, r1, 0x0) 18:18:47 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000180)="aa", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c46000000040180000000000000000000000004000000000000000000004000000000000000000000000000000000000000000438000200000000007f00000000000800000000000000000000000300000000080000000000000000000000000000000000000200000000000000ff0300000000000074f940cfc1e5984199da552461b4cbfb66eca196752e14d0acf02614d2352effb6bb9624cd82c6413cf4777cc90e01ffde818d0e51ab4fa56a0493280c32c453804ced23b64d541fe1ae1230337cfb8078"], 0xc9) sendto$inet(r0, &(0x7f00000012c0)="03", 0x10002, 0x9, 0x0, 0x0) 18:18:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:48 executing program 3: 18:18:48 executing program 5: socket(0x2, 0xc003, 0x0) r0 = socket(0x2, 0x0, 0x0) setsockopt(r0, 0x0, 0x7, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket(0x2, 0xc003, 0x0) connect$unix(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="8202adfdffffffffffff3f7b238bf46854d78a2a597a386207000000008295955984c87910bf093f68c11700287ead4bcb777fa69dfceac2a84e6abca64896819f507d0000000000002951b15801360bcd4c0a162b58fd4237b8fa4d012ae447473c220495aaee48c02f6ac41e6bf3bf554799000000ed52beb85a85f8b2fd57d60f13ad30505e8f5300a4aeef9d612f871f4385f04157795ea4a5c5a202361cd8cac7dbbc5b65c6593d2870b4272cd2350000000000000000000000000000000000df42d280ede065dc0643ec6b000000000000000019f4ffff8bed2e1977bd035f5ea1b1009e5a319d54405cb92f77420eea4173d5b6913eef9e8b0fb636710000d2df0ac8fe0d3b2a8ade532ddf3b7e4765b7240cf97d03126da5364082bec304ee9a498252abb7cc5bac417e2ab04fd8a9c98e958ff55dd6bb59e2791038ff36d11b2474c929b34b0587cf25dd9e1e49f931a4191c32c09ee7bcd91fc03fd1139e1854ce0ce5365aae21671a3e55182ef94762f5cfc6717cb0a89343bafa84108803d07d8043bf590d523c9b6518d8fed4f40d1666abddf5e02cb329254a291abd25fd6380ecbef2cc709c37de"], 0x10) dup2(r2, r1) setsockopt$sock_int(r1, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r3 = dup(r1) sendto$inet6(r3, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) 18:18:48 executing program 2: 18:18:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:49 executing program 2: 18:18:49 executing program 3: 18:18:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:49 executing program 5: 18:18:49 executing program 2: 18:18:49 executing program 3: 18:18:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:49 executing program 5: 18:18:49 executing program 2: 18:18:49 executing program 3: 18:18:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:49 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:49 executing program 2: 18:18:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x0, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:49 executing program 5: 18:18:50 executing program 3: 18:18:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:50 executing program 2: 18:18:50 executing program 5: 18:18:50 executing program 3: 18:18:50 executing program 2: 18:18:50 executing program 5: 18:18:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:50 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:50 executing program 2: 18:18:50 executing program 5: 18:18:50 executing program 3: 18:18:51 executing program 5: 18:18:51 executing program 2: 18:18:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:51 executing program 3: 18:18:51 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, 0x8) 18:18:51 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:51 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@srh, 0x8) 18:18:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x10}, 0x8) 18:18:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:51 executing program 5: accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xdd98, 0x5, 0x0, 0xfffffffffffffe19) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 18:18:52 executing program 2: 18:18:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:52 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:52 executing program 3: 18:18:52 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000040)) creat(0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x4, 0x8, 0x6, 0x0, 0x1, 0x0, [], r1}, 0x3c) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000100)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 18:18:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x4, 0x8, 0x6, 0x0, 0x1, 0x0, [], r1}, 0x3c) 18:18:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:52 executing program 3: mkdir(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_BMAP(r0, &(0x7f00000003c0)={0x18, 0x0, 0x8, {0x4}}, 0x18) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) sendmmsg$sock(r1, &(0x7f0000004240)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000700)="318533735b5bae", 0x7}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000000)=0x6, 0x4) setsockopt$inet_int(r1, 0x0, 0x17, &(0x7f00000002c0)=0x7, 0x4) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x4000000000000ac, 0x43, 0x0) tkill(0x0, 0x9) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) fsetxattr$security_ima(r3, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000380)=@v1={0x2, "66adff6286b053"}, 0x8, 0x2) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000005000/0x2000)=nil) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="150000610000fa03459cce8496cc612d000000f10000000000"], 0x15) r4 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x40) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\b\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00082abd7000ffdbdf250b0000005c0004002c000700080001001c0000000800040008000000080003000200000008738dc331731cd97bfe0003006f0e000008000200010100002c00070008000100050000000800010009000000080001001a0000000800029de755da0008000300060007000000060008000100010000000800010009000000280004000c00010073797a30000000000c000700080004007f0000000c00010073797a31000000001c0004000c000700080001001f0000000c00010073797a30000000001c000600080001000000000008000100040000000400020004000200"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x800) dup(0xffffffffffffffff) 18:18:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{0x0}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xa0}, [@ldst={0x6, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffef9}, 0x48) 18:18:53 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) socket$inet6(0xa, 0x3, 0x9) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace(0x4207, r4) ptrace$setregset(0x11, r4, 0x0, 0x0) 18:18:53 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) [ 441.841439][T10340] ptrace attach of "/root/syz-executor.2"[7244] was attempted by "/root/syz-executor.2"[10340] 18:18:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:53 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace(0x4207, r4) ptrace$setregset(0x11, r4, 0x0, 0x0) [ 442.002951][T10344] ptrace attach of "/root/syz-executor.2"[7244] was attempted by "/root/syz-executor.2"[10344] 18:18:53 executing program 5: socket$kcm(0x10, 0x200000000000003, 0x4) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) close(0xffffffffffffffff) r1 = getpgid(0x0) fcntl$setown(0xffffffffffffffff, 0x8, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() getpgrp(r2) getpid() close(0xffffffffffffffff) io_setup(0x206, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00\x132\x1a\x0e$\xff\xa2\x94\x86\xac<\x1cG\x1e\xa2g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04') r4 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r3, r4, 0x0, 0x1) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) dup(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x3c) eventfd2(0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) io_submit(0x0, 0x2, &(0x7f00000008c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0xf, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x0]) r5 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r5, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6c, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 18:18:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:53 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) socket$inet6(0xa, 0x3, 0x9) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace(0x4207, r4) ptrace$setregset(0x11, r4, 0x0, 0x0) [ 442.192277][T10358] ptrace attach of "/root/syz-executor.3"[7567] was attempted by "/root/syz-executor.3"[10358] [ 442.267491][T10360] ptrace attach of "/root/syz-executor.3"[7567] was attempted by "/root/syz-executor.3"[10360] [ 442.366032][T10365] ptrace attach of "/root/syz-executor.2"[7244] was attempted by "/root/syz-executor.2"[10365] 18:18:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x4d, 0x0, 0x0) 18:18:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{0x0}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(0xffffffffffffffff, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:54 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x2, &(0x7f0000000140)={@rand_addr="b86ce1f35661a7bba359e66e83003f23"}, 0x182) 18:18:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xc, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x98) r3 = memfd_create(&(0x7f0000000180)='\xe0|\x1e\x13L\xe1\xe7\\X\x0fBQ\xcf\xfe\xe9n\"\xddm\xba\xce\x88\xdd?wR\x81\xb1f\xcaq\xf4]\xa7\x1dx5\x8fM\xca\x8b\xf3\'\xf4P\x0eO\xb9\x17\x80\xaa\xaa=\x16\xae\xaa\x0f\x92)\x18\xf1\xd6\x02#\xac\xbc\xd9\xea\x14\x92\xf5gD\xd8\xdb9N\xcc\xc1`0\xac\xac\xb7\xfc,7\xa9&K\xe6V\xd9\x9c\xa5\x88\xd7\x8f\xb5', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r3, 0x0) r4 = dup2(r3, r2) dup3(r4, r1, 0x0) 18:18:54 executing program 3: r0 = open(0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000340)={0xff}) personality(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = creat(0x0, 0x5) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8990, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00H\x00?'}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 18:18:54 executing program 2: ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x3}) 18:18:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(0xffffffffffffffff, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:54 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r6, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x30}}, 0x0) 18:18:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(0xffffffffffffffff, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:54 executing program 2: rmdir(0x0) r0 = dup(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4008080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0x8000000000003b) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) 18:18:55 executing program 3: r0 = socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000280)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0xe0000005}) [ 443.646397][ T25] audit: type=1804 audit(1572373134.977:41): pid=10410 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/146/file0" dev="sda1" ino=17088 res=1 [ 443.647906][T10410] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 443.704889][T10410] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 18:18:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{0x0}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:18:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffeae, &(0x7f00000000c0)=[{&(0x7f0000000100)="2e0000001e00055aed0080637e6394f20100d2000500fcb711407f480f0001000300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) [ 444.309431][T10441] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 444.331458][T10441] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. [ 444.356862][ T25] audit: type=1804 audit(1572373135.687:42): pid=10408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/146/file0" dev="sda1" ino=17088 res=1 [ 444.393718][T10410] team0: Device lo is loopback device. Loopback devices can't be added as a team port 18:18:55 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 444.417786][T10410] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 18:18:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:55 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r6, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x30}}, 0x0) 18:18:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:18:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) [ 444.933025][ T25] audit: type=1804 audit(1572373136.257:43): pid=10459 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/147/file0" dev="sda1" ino=17097 res=1 [ 444.962764][T10459] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 444.991354][T10459] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 18:18:56 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:56 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:18:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:18:57 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r6, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x30}}, 0x0) 18:18:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:57 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) [ 446.412124][T10502] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 446.414217][ T25] audit: type=1804 audit(1572373137.737:44): pid=10502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/148/file0" dev="sda1" ino=17094 res=1 18:18:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) [ 446.523729][T10502] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 18:18:58 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:18:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:18:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0x105, 0x1) write$binfmt_misc(r2, 0x0, 0x0) 18:18:58 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r6, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x30}}, 0x0) 18:18:58 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) [ 447.518160][ T25] audit: type=1804 audit(1572373138.847:45): pid=10536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/149/file0" dev="sda1" ino=17035 res=1 [ 447.559401][T10536] team0: Device lo is loopback device. Loopback devices can't be added as a team port 18:18:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) [ 447.613808][T10536] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 18:18:59 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:18:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:18:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:18:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/68, 0x44}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000001780)=""/108, 0x6c}], 0x2}}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002b40)=""/103, 0x67}, {0x0}, {0x0}], 0x3, &(0x7f0000003000)=""/145, 0x91}}], 0x3, 0x40000000, 0x0) 18:18:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:18:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) 18:18:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:18:59 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 448.751770][ T25] audit: type=1804 audit(1572373140.077:46): pid=10573 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/150/file0" dev="sda1" ino=17098 res=1 18:19:00 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:00 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) 18:19:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 449.672486][ T25] audit: type=1804 audit(1572373140.997:47): pid=10592 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/151/file0" dev="sda1" ino=17082 res=1 18:19:01 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:01 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:01 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000000, 0x0) 18:19:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) [ 450.727606][ T25] audit: type=1804 audit(1572373142.057:48): pid=10611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/152/file0" dev="sda1" ino=17090 res=1 18:19:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:02 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 18:19:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:02 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) 18:19:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 451.704562][ T25] audit: type=1804 audit(1572373143.037:49): pid=10648 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/153/file0" dev="sda1" ino=16770 res=1 18:19:03 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, 0x0, 0x0) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:03 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 18:19:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, 0x0, 0x0) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:03 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) 18:19:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, 0x0, 0x0) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:04 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}}, 0x1c) socket$netlink(0x10, 0x3, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2}, 0x10) 18:19:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:04 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 452.800290][ T25] audit: type=1804 audit(1572373144.127:50): pid=10681 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/154/file0" dev="sda1" ino=16993 res=1 [ 452.942085][ T25] audit: type=1804 audit(1572373144.197:51): pid=10682 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17116 res=1 18:19:04 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountstats\x00') preadv(r0, 0x0, 0x0, 0x400000000000) syz_open_procfs(0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x1e0, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) ioctl$KDGKBLED(r2, 0x4b64, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010802000000000000", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b000000000074fd02d766ff61ea0fed87e6b17f1e623002edf035b6f556dc7cfe2a24efbbc264d4f6194e4c51a9262f4214e2cb9208c80a0b75e4bcbf5d3d1938d79d50d894289ebb327162"], 0x3}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) [ 453.033872][ T25] audit: type=1804 audit(1572373144.217:52): pid=10683 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17116 res=1 18:19:04 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 18:19:04 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) 18:19:04 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountstats\x00') preadv(r0, 0x0, 0x0, 0x400000000000) syz_open_procfs(0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x1e0, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) ioctl$KDGKBLED(r2, 0x4b64, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010802000000000000", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b000000000074fd02d766ff61ea0fed87e6b17f1e623002edf035b6f556dc7cfe2a24efbbc264d4f6194e4c51a9262f4214e2cb9208c80a0b75e4bcbf5d3d1938d79d50d894289ebb327162"], 0x3}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 18:19:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 453.585978][ T25] audit: type=1804 audit(1572373144.917:53): pid=10708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/155/file0" dev="sda1" ino=16929 res=1 18:19:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:05 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountstats\x00') preadv(r0, 0x0, 0x0, 0x400000000000) syz_open_procfs(0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x1e0, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) ioctl$KDGKBLED(r2, 0x4b64, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010802000000000000", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b000000000074fd02d766ff61ea0fed87e6b17f1e623002edf035b6f556dc7cfe2a24efbbc264d4f6194e4c51a9262f4214e2cb9208c80a0b75e4bcbf5d3d1938d79d50d894289ebb327162"], 0x3}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 18:19:05 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:05 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 18:19:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) [ 454.373622][ T25] audit: type=1804 audit(1572373145.697:54): pid=10731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/156/file0" dev="sda1" ino=17123 res=1 18:19:05 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountstats\x00') preadv(r0, 0x0, 0x0, 0x400000000000) syz_open_procfs(0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x1e0, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) ioctl$KDGKBLED(r2, 0x4b64, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010802000000000000", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b000000000074fd02d766ff61ea0fed87e6b17f1e623002edf035b6f556dc7cfe2a24efbbc264d4f6194e4c51a9262f4214e2cb9208c80a0b75e4bcbf5d3d1938d79d50d894289ebb327162"], 0x3}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 18:19:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:06 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x8002, {0x0, [{{0x2, 0x4}, 0x3, 0x1f, 0x7, './file0'}, {{0xb4, 0x2, 0x4}, 0x8, 0x1d, 0x7, './file0'}, {{0x8, 0x1, 0x3}, 0x814d, 0x1b, 0x7, './file0'}, {{0x8, 0x2}, 0x5, 0x1, 0x7, './file0'}]}}, 0x87) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000140)) setsockopt$inet6_tcp_int(r4, 0x6, 0x24, &(0x7f0000000000)=0xd6b8, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 18:19:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:06 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:06 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 455.514220][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 455.520092][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 455.684204][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 455.690020][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:19:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:07 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 456.074255][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 456.080089][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:19:07 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) [ 456.314233][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 456.320076][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:07 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x8002, {0x0, [{{0x2, 0x4}, 0x3, 0x1f, 0x7, './file0'}, {{0xb4, 0x2, 0x4}, 0x8, 0x1d, 0x7, './file0'}, {{0x8, 0x1, 0x3}, 0x814d, 0x1b, 0x7, './file0'}, {{0x8, 0x2}, 0x5, 0x1, 0x7, './file0'}]}}, 0x87) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000140)) setsockopt$inet6_tcp_int(r4, 0x6, 0x24, &(0x7f0000000000)=0xd6b8, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 18:19:07 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 456.714244][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 456.720243][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:19:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:08 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(0xffffffffffffffff, 0x105, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x0, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:08 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x8002, {0x0, [{{0x2, 0x4}, 0x3, 0x1f, 0x7, './file0'}, {{0xb4, 0x2, 0x4}, 0x8, 0x1d, 0x7, './file0'}, {{0x8, 0x1, 0x3}, 0x814d, 0x1b, 0x7, './file0'}, {{0x8, 0x2}, 0x5, 0x1, 0x7, './file0'}]}}, 0x87) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000140)) setsockopt$inet6_tcp_int(r4, 0x6, 0x24, &(0x7f0000000000)=0xd6b8, 0x4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 18:19:08 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:09 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x0, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:10 executing program 0: io_setup(0x8, &(0x7f0000000180)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a86008", 0x11) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 18:19:10 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:10 executing program 0: io_setup(0x8, &(0x7f0000000180)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a86008", 0x11) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 18:19:10 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) socket$inet6_sctp(0xa, 0x1, 0x84) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:10 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x0, 0x1) write$binfmt_misc(r3, 0x0, 0x0) 18:19:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:10 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) accept$packet(r0, &(0x7f00000000c0), 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000380)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB], 0x1}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x3, 0xd7, 0xffffffffffff7fff, 0x3, 0x0, 0x0, 0x1d0, 0x40, 0x1f4, 0x1000, 0x8, 0x38, 0x1}, [{0x70000007, 0x2, 0x0, 0x0, 0x0, 0x9, 0x80000000}], "578b7b954671bc90d570383868ef6db5e2b0395bfeceb343b5b58667c0ad46bc45bcace5acff0733899edabfda64db96923a800722dc320a01298d2a"}, 0xb4) sendfile(r2, r2, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r4) syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0x0}, 0x0) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000080)=""/43, 0x2b}], 0x1, 0x0) 18:19:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x0) write$binfmt_misc(r3, 0x0, 0x0) 18:19:11 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:11 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) accept$packet(r0, &(0x7f00000000c0), 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000380)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB], 0x1}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) write$binfmt_elf64(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x3, 0xd7, 0xffffffffffff7fff, 0x3, 0x0, 0x0, 0x1d0, 0x40, 0x1f4, 0x1000, 0x8, 0x38, 0x1}, [{0x70000007, 0x2, 0x0, 0x0, 0x0, 0x9, 0x80000000}], "578b7b954671bc90d570383868ef6db5e2b0395bfeceb343b5b58667c0ad46bc45bcace5acff0733899edabfda64db96923a800722dc320a01298d2a"}, 0xb4) sendfile(r2, r2, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r4) syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0x0}, 0x0) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000080)=""/43, 0x2b}], 0x1, 0x0) 18:19:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:11 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) socket$inet6_sctp(0xa, 0x1, 0x84) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:11 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 460.577152][ T25] audit: type=1804 audit(1572373151.907:55): pid=10899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17148 res=1 18:19:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:12 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x0) write$binfmt_misc(r3, 0x0, 0x0) 18:19:12 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) socket$inet6_sctp(0xa, 0x1, 0x84) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 461.546592][ T25] audit: type=1804 audit(1572373152.867:56): pid=10899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17148 res=1 18:19:13 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x0) write$binfmt_misc(r3, 0x0, 0x0) 18:19:13 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 462.069288][ T25] audit: type=1804 audit(1572373153.397:57): pid=10927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17148 res=1 18:19:13 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:14 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 18:19:14 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:14 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 463.313668][ T25] audit: type=1804 audit(1572373154.637:58): pid=10958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17148 res=1 18:19:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 18:19:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:15 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:15 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:15 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 464.409015][ T25] audit: type=1804 audit(1572373155.737:59): pid=10982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17136 res=1 18:19:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 18:19:15 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000140)='threaded\x00', 0x5dc291) clone(0x80020100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r3, 0x105, 0x1) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 18:19:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 18:19:16 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) 18:19:16 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 465.246436][ T25] audit: type=1804 audit(1572373156.577:60): pid=11008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17136 res=1 18:19:16 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:17 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 18:19:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0xc8}, 0x1c) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b45602117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710c8000000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 18:19:17 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) [ 466.002289][ T25] audit: type=1804 audit(1572373157.327:61): pid=11029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17159 res=1 18:19:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, 0x0, 0x0, 0x11, 0x0, 0x0) 18:19:17 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8001, 0x0) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, 0x0, &(0x7f0000001600)) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0xff}, &(0x7f0000000280)=0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000002680)={0x0}, &(0x7f0000002740)=0x8) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005080)=[{&(0x7f0000000140)=@in={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)="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", 0xffc}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b4c6fd11dfdbee3579f4fe14d999547d16420eac9a80ba0bde00973bc6366ea3dd849e912ce753f613dbae6f7f79b9f54", 0x84}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259bdc12d5d430f627310fd4dd74df00eae0c9ee7a8a48e6", 0x95}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, &(0x7f0000001900)=[{&(0x7f00000016c0)="e3f93de3acfcc6a0f225f7c9178d127b061795cc35ab74707f78e2a9414c52fc", 0x20}, {&(0x7f0000001740)="d228a836f329d2587d0c94220a3edbb76fa5cf087c84695b74f0fef56510f6abab6dbae045f78013f520cd451f10808ac5224e0d272bfeda996ba7f772815d67c56fe4bc51ef726c5146e34d5419f41350032f26006a4bd0c81484e10c44b3059c1cc4e434a9f4ec7fece1b12b3787cf4ad57682ee0c0597ef2c84dec055d569fec819a8c53e4fc18c930601cacc7e040899c74df331963484ace77c0b9ace4883718276d784fc708779a0c6424c684549bc7f5eb267243e50255df948e89d13d3899a6d7fee33875f2361a65946a9479ab51f16185dcc9be903154c628e7cc810e3484e0a6197c7612934ee8765858fd1f32af2b513", 0xf6}, {&(0x7f0000001840)="46302a954be71168e41d858e03ddf620bc0c3c30df99ed4fd2c2d66b31ddf6a1eda5cd295528460c036b3e50e175670ab33de69f3439ba4838ada6f31c2e7cda7f936789e8e7d72fd0d8f472", 0x4c}, {&(0x7f00000018c0)="30260b044fe7ba91f5aa17ca6d9162606895c149ad2e9d0d24029b444e", 0x1d}, {&(0x7f0000001e80)="aea7a969b8f511ecfc47a88ebd9d008be18f2047a6e15fe398a2bf8e9a06258cb2571488dc931ae269a43ba5d1a954b12d5615a030b0edb520166108ac38b9006ad4dc263a921600b4ce4d9cdab015abeebc25301fedf0cacdfd1ab8531ce9b06b8e4eb28553c296cc3fe84e28d9f092e893caf13fb70cc47ffae6042c6cfa7e9b061a0b08859326c93eecca69776ad48f1bb520d31065590d5fac99e74d6f7eb7468314d6911288048ddce69d1b1558fd3852d872dc540a6cc8b46c18b783d9619e117b01c7fa102d97c00e2b1616bd889dcafe16df2c215380fbb8a7e34a4e8d", 0xe1}], 0x5, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x2, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000001f80)=@in6={0xa, 0x4e20, 0x0, @mcast2, 0x8}, 0x1c, &(0x7f0000002000)=[{&(0x7f0000001fc0)="8129dbf575d513de2563f6d7b03487fa1e8d8409fe179d3738302d74ac4f5157983a7c1f944bdf8ec2f393da3f8fbc23d6ce9c9ecfd0c0691a", 0x39}], 0x1, 0x0, 0x0, 0x4090}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2, 0x43f8}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}], 0x2, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000, 0x3, 0x7fffffff, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @sndinfo={0x20, 0x84, 0x2, {0x7f, 0x0, 0x0, 0x0, r5}}, @init={0x18, 0x84, 0x0, {0x6, 0x0, 0x6, 0x8}}], 0x70, 0x4000}, {&(0x7f0000002840)=@in6={0xa, 0x4e24, 0x4, @loopback, 0x7f}, 0x1c, &(0x7f0000002c80)=[{0x0}, {&(0x7f00000028c0)}, {0x0}, {&(0x7f0000002b80)}], 0x4, 0x0, 0x0, 0x4000}, {&(0x7f0000002d00)=@in6={0xa, 0x4e20, 0x9fc, @mcast2, 0x754de1c3}, 0x1c, &(0x7f0000004f80)=[{&(0x7f0000002d40)}, {0x0}, {&(0x7f0000003e40)}, {&(0x7f0000003ec0)}], 0x4, &(0x7f0000005000)=[@authinfo={0x18, 0x84, 0x6, {0xffff}}, @authinfo={0x18, 0x84, 0x6, {0x20}}], 0x30}], 0x6, 0xb4af37cf9f4efe4) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001a00)={'syz0\x00', {0x0, 0x0, 0x1035}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x7fff, 0x0, 0x0, 0x1, 0x58ff0241, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0xffffffe1, 0x0, 0x0, 0x0, 0x0, 0x21d], [0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, 0x7, 0x200, 0x0, 0x3, 0x80000000, 0x8, 0x0, 0x6b, 0x4, 0xff, 0x0, 0x0, 0x1bb40000, 0x0, 0x1ff, 0x4, 0x7a3c24b6, 0x4, 0x2, 0x87a, 0x0, 0x0, 0x80000001, 0x2, 0x45ad, 0x0, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffff8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffff, 0x0, 0xd9c, 0x0, 0xff, 0x8c7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x7a, 0x0, 0x6, 0xb9d, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1000, 0x5, 0x20, 0x6, 0xfff, 0x0, 0x8000, 0xffff7fff, 0x0, 0x0, 0x0, 0x3, 0x910a, 0x0, 0x0, 0x2]}, 0x45c) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r6, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:18 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:18 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 18:19:18 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) 18:19:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x28, r3, 0xd0f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 18:19:18 executing program 4: io_setup(0x8, &(0x7f0000000180)) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3f", 0x15) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 467.064924][T11063] Enabling of bearer rejected, failed to enable media [ 467.089735][ T25] audit: type=1804 audit(1572373158.417:62): pid=11065 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17159 res=1 18:19:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, 0x0, 0x0, 0x11, 0x0, 0x0) 18:19:18 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:19 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:19 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 18:19:19 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) [ 468.257717][ T25] audit: type=1804 audit(1572373159.587:63): pid=11091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17160 res=1 18:19:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, 0x0, 0x0, 0x11, 0x0, 0x0) 18:19:19 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 18:19:20 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:20 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:20 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 469.441716][ T25] audit: type=1804 audit(1572373160.767:64): pid=11119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17164 res=1 18:19:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) 18:19:20 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:21 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:21 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) [ 470.308005][ T25] audit: type=1804 audit(1572373161.637:65): pid=11137 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17136 res=1 18:19:21 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 18:19:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) 18:19:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 18:19:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:22 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:22 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:22 executing program 3: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 18:19:22 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:23 executing program 3: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 18:19:23 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0), 0x0, 0x11, 0x0, 0x0) 18:19:23 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:23 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:23 executing program 3: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 18:19:23 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:23 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:23 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:23 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:24 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) 18:19:24 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:24 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:24 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:24 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) 18:19:24 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:25 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:25 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) 18:19:25 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0x11, 0x0, 0x0) 18:19:25 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:25 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:25 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:25 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:26 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0x11, 0x0, 0x0) [ 474.798032][ T25] audit: type=1804 audit(1572373166.127:66): pid=11258 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17160 res=1 18:19:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0x11, 0x0, 0x0) 18:19:26 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) 18:19:26 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:26 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:27 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 476.021270][ T25] audit: type=1804 audit(1572373167.347:67): pid=11290 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16801 res=1 18:19:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) 18:19:27 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) 18:19:27 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:28 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:28 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) [ 477.050761][ T25] audit: type=1804 audit(1572373168.377:68): pid=11312 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16529 res=1 18:19:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:28 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) 18:19:28 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:28 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) 18:19:29 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:19:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) [ 478.286502][ T25] audit: type=1804 audit(1572373169.617:69): pid=11342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17201 res=1 18:19:29 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:29 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:30 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) 18:19:30 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec", 0x4b, 0x11, 0x0, 0x0) [ 479.304620][ T25] audit: type=1804 audit(1572373170.637:70): pid=11368 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17201 res=1 18:19:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:30 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:31 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:31 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x11, 0x0, 0x0) 18:19:31 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:31 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x11, 0x0, 0x0) [ 480.419689][ T25] audit: type=1804 audit(1572373171.747:71): pid=11399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17200 res=1 18:19:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:32 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:32 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66", 0x4c, 0x11, 0x0, 0x0) 18:19:32 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 18:19:32 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 481.612597][ T25] audit: type=1804 audit(1572373172.937:72): pid=11428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16566 res=1 18:19:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:33 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:33 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:33 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 18:19:33 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 482.643573][ T25] audit: type=1804 audit(1572373173.967:73): pid=11450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16866 res=1 18:19:34 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:34 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:34 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000004340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) 18:19:35 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:35 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 483.985550][ T25] audit: type=1804 audit(1572373175.317:74): pid=11472 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16914 res=1 18:19:35 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:35 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:36 executing program 1: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:36 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:36 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 485.305915][ T25] audit: type=1804 audit(1572373176.637:75): pid=11495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16625 res=1 18:19:36 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:36 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:37 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 485.914555][ T25] audit: type=1804 audit(1572373177.247:76): pid=11510 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16929 res=1 18:19:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @multicast2}, 0x0, 0x4}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) wait4(0x0, 0x0, 0x0, 0x0) 18:19:37 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:37 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:37 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:37 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:37 executing program 1: [ 486.602244][ T25] audit: type=1804 audit(1572373177.927:77): pid=11531 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16850 res=1 18:19:38 executing program 1: 18:19:38 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:38 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:38 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 487.068485][ T25] audit: type=1804 audit(1572373178.397:78): pid=11541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16531 res=1 18:19:38 executing program 1: 18:19:38 executing program 5: r0 = open(0x0, 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:38 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:38 executing program 1: 18:19:39 executing program 5: r0 = open(0x0, 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:39 executing program 1: 18:19:39 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:39 executing program 1: 18:19:39 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:39 executing program 5: r0 = open(0x0, 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 488.218882][ T25] audit: type=1804 audit(1572373179.547:79): pid=11571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17215 res=1 18:19:39 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:39 executing program 1: 18:19:40 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:40 executing program 1: 18:19:40 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:40 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:40 executing program 1: 18:19:40 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:40 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:40 executing program 1: 18:19:40 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 489.479938][ T25] audit: type=1804 audit(1572373180.807:80): pid=11603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16721 res=1 18:19:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0b") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:41 executing program 1: 18:19:41 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:41 executing program 1: 18:19:41 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:41 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:41 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 490.530894][ T25] audit: type=1804 audit(1572373181.857:81): pid=11630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16737 res=1 18:19:42 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) 18:19:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0b") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:42 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 491.349955][T11643] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 18:19:42 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:43 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:43 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 491.848634][T11664] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 18:19:43 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) [ 492.043833][ T25] audit: type=1804 audit(1572373183.367:82): pid=11671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17221 res=1 18:19:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0b") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:43 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) 18:19:43 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:43 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:44 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:44 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:44 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) [ 493.281162][ T25] audit: type=1804 audit(1572373184.607:83): pid=11707 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17221 res=1 18:19:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:44 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:44 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) 18:19:44 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:45 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) 18:19:45 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:45 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:45 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:45 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) [ 494.414251][ T25] audit: type=1804 audit(1572373185.737:84): pid=11755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17228 res=1 18:19:45 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:45 executing program 4: r0 = syz_open_dev$midi(0x0, 0x8001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:45 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) 18:19:46 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) 18:19:46 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:46 executing program 4: syz_open_dev$midi(0x0, 0x8001, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r0, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:46 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 495.699091][T11794] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 18:19:47 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 495.980045][ T25] audit: type=1804 audit(1572373187.307:85): pid=11801 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17245 res=1 18:19:47 executing program 1: r0 = creat(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)={'#! ', './file0', [{0x20, '@GPL'}]}, 0x10) socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, 0x0, 0x10000000) socket$nl_route(0x10, 0x3, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB='# ./file0 @GP'], 0xe) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000006c0)=[{{&(0x7f0000000140)=@nfc, 0x80, 0x0}, 0x397}], 0x1, 0x0, 0x0) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r6, 0x0, 0x18a, 0x0, 0x0, 0x2f95a3c3cb55ab4b) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c", 0x11, 0x400}], 0x4801, 0x0) 18:19:47 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:47 executing program 4: syz_open_dev$midi(0x0, 0x8001, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r0, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:48 executing program 1: r0 = msgget(0x3, 0x100) r1 = socket(0x2, 0xc003, 0x0) connect$unix(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="8202adfdffffffffffffff653000463f7b238bf46854d78a2a197a38620700006af98295955984c87914bf453f68c11700287ead4bcb777fa69dfceac2a84e6abca64896bc01010000000000008b2951b158013637b8fa4d012ae447473c238495aaee48c02f6ac41e6bf3bf554799b9b813ad30505e8f5300a49fef9d612f871f4385f04157795ea4a5c5fe659fa202151cd8cac7dbbc5b65c6593d2870b4122cd23500"/189], 0x10) write(r1, 0x0, 0x0) shutdown(r1, 0x3) msgrcv(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000875c25c09ca9971800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dd0c36e526000000000000000000000000000000000000000000000000660000000000000000000000001200051b5f765f8665b6a5618fe3587bd2e959b828618c12a2dc25cf7716b1b14af1ea56641bd28dc410fa6e082441534854abb01e20ff73f194133a90f7b0475b73b5f094b684a7324f42598d8e6af27ee19946b48d6cc7a3a657fe93715f25dc4ac31dd0dd27cce6"], 0x97, 0x1, 0x1000) pipe2(&(0x7f0000000380)={0xffffffffffffffff}, 0x2) r3 = msgget$private(0x0, 0x8) msgsnd(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="2c0685163ddc0972ca62c7c26fa0ef6f8427c9e2dbe0c9a659e602cf4af85f50bf9296d0ff429118c1ba7dcede0ba9ab374399ce02042e9c17754838e0ca4eb3b8f95af25c0d4439a449c76c8dcfdb303817fb58e1659d037d2575ad054e3b81cc3277d77416782223b038fe0ee71e6822ebd0587f4a8f0ee102000000b23093b583cea9661940fe292a88166020ffc45a3247e39058409781fe744ef8282fda537f25964faf89b20bdcda7fb52d02a8022435bbcf95f0f117d8d86d951148c72c005b09ea2db47a222ba82f2e2e5d6ba1e8564f4307f3cd663c2d5fab78844b", @ANYRES32=r2, @ANYRESDEC, @ANYRES16=r0, @ANYRES32=r2, @ANYRESOCT=r2, @ANYRES32=0x0], 0x7, 0x800) msgsnd(r0, &(0x7f0000000100)={0x3, "8d8a5547cc6e3e155504f208446dcee7931b631692e6b25405f0180dc88cc55608bd1ef3bd70919f1651a6697c"}, 0x35, 0x0) msgrcv(r0, &(0x7f0000000140)={0x0, ""/68}, 0x4c, 0x0, 0x0) 18:19:48 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=@routing, 0x8) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0800b5055e0bcfe87b2071") setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @rand_addr="a10310540b20e9bce8b09ae2decb4aed"}, 0x1c) 18:19:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b00") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:48 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 497.044031][ T25] audit: type=1804 audit(1572373188.367:86): pid=11833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16641 res=1 18:19:48 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:48 executing program 4: syz_open_dev$midi(0x0, 0x8001, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r0, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:48 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a000000010000001d09"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r1, 0x541f, &(0x7f0000000100)={0x0, 0x0}) 18:19:49 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 497.806689][ T25] audit: type=1804 audit(1572373189.137:87): pid=11853 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/" dev="sda1" ino=2333 res=1 [ 497.883620][ T25] audit: type=1804 audit(1572373189.207:88): pid=11858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16641 res=1 18:19:49 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 497.939712][ T25] audit: type=1800 audit(1572373189.237:89): pid=11853 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="sda1" ino=2333 res=0 18:19:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b00") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 498.091264][ T25] audit: type=1804 audit(1572373189.417:90): pid=11861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16641 res=1 18:19:49 executing program 1: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="bc"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) lseek(0xffffffffffffffff, 0x0, 0x0) 18:19:49 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:49 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x0, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:49 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r0, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 498.442736][ T25] audit: type=1804 audit(1572373189.767:91): pid=11871 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16771 res=1 18:19:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000240)="0800b5055e0bcf0b7c2071") setsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000000)=0x9, 0x4) sendmmsg(r0, &(0x7f0000000140), 0x4000000000001c3, 0x0) 18:19:49 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r2, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r3, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:50 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 498.905868][ T25] audit: type=1804 audit(1572373190.237:92): pid=11886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16866 res=1 18:19:50 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x0, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:50 executing program 1: r0 = socket(0x2000000000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="22000000140067058d0000bdc2459804020803130100000008000200413b2f2804ca", 0x22) 18:19:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b00") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 499.294333][T11897] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.1'. 18:19:50 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200), 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) fcntl$setsig(r0, 0xa, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r3, 0x0, 0x1, &(0x7f0000000300)={0x200, {{0x2, 0x4e22, @rand_addr=0x9}}, {{0x2, 0x4e22, @rand_addr=0x8}}}, 0x104) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) 18:19:50 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r0, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:50 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r2, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r3, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 499.709199][ C0] net_ratelimit: 6 callbacks suppressed [ 499.709254][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 499.801084][ T25] audit: type=1804 audit(1572373191.127:93): pid=11910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17121 res=1 18:19:51 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x0, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:51 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:51 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200), 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) fcntl$setsig(r0, 0xa, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r3, 0x0, 0x1, &(0x7f0000000300)={0x200, {{0x2, 0x4e22, @rand_addr=0x9}}, {{0x2, 0x4e22, @rand_addr=0x8}}}, 0x104) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) 18:19:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 18:19:51 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r2, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r3, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:51 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r0, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) [ 500.699139][ T25] audit: type=1804 audit(1572373192.027:94): pid=11933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17041 res=1 18:19:52 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 18:19:52 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:52 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200), 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) fcntl$setsig(r0, 0xa, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r3, 0x0, 0x1, &(0x7f0000000300)={0x200, {{0x2, 0x4e22, @rand_addr=0x9}}, {{0x2, 0x4e22, @rand_addr=0x8}}}, 0x104) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) 18:19:52 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:52 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:53 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 501.841366][ T25] audit: type=1804 audit(1572373193.167:95): pid=11961 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17185 res=1 18:19:53 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:53 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:53 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:53 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200), 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) fcntl$setsig(r0, 0xa, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r3, 0x0, 0x1, &(0x7f0000000300)={0x200, {{0x2, 0x4e22, @rand_addr=0x9}}, {{0x2, 0x4e22, @rand_addr=0x8}}}, 0x104) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) 18:19:54 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:54 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 502.763559][ T25] audit: type=1804 audit(1572373194.087:96): pid=11984 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17185 res=1 18:19:54 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, 0x0, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:54 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:54 executing program 4: syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r0, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:54 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 503.603061][ T25] audit: type=1804 audit(1572373194.927:97): pid=12004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17185 res=1 18:19:55 executing program 1: r0 = socket(0x11, 0x10000000000003, 0x0) getpeername$inet6(r0, 0x0, 0x0) 18:19:55 executing program 4: syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r0, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:55 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0xfffffffffffffff7, &(0x7f0000000080)={&(0x7f0000000640)=@gettaction={0x28, 0x32, 0x209, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x44010}, 0x0) 18:19:55 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x15, 0xc75, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000260007031dfffd946f610500070000006700000077000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 504.187354][T12023] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 504.197185][T12023] tc_dump_action: action bad kind 18:19:55 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:55 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:55 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:56 executing program 4: syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r0, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 504.721564][ T25] audit: type=1804 audit(1572373196.037:98): pid=12043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16866 res=1 18:19:56 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:56 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040)=0x4000000000007, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 18:19:56 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:56 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:56 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:19:56 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 505.665234][ T25] audit: type=1804 audit(1572373196.997:99): pid=12066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16801 res=1 18:19:57 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:57 executing program 1: 18:19:57 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:57 executing program 1: 18:19:57 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:57 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:57 executing program 1: 18:19:57 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 506.542094][ T25] audit: type=1804 audit(1572373197.867:100): pid=12090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17248 res=1 18:19:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:58 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:58 executing program 1: 18:19:58 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:58 executing program 1: 18:19:58 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:58 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 507.431113][ T25] audit: type=1804 audit(1572373198.757:101): pid=12120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16593 res=1 18:19:58 executing program 1: 18:19:58 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:58 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:19:59 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:19:59 executing program 1: 18:19:59 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f"], 0x43) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:59 executing program 1: 18:19:59 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:19:59 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:19:59 executing program 1: [ 508.606957][ T25] audit: type=1804 audit(1572373199.937:102): pid=12149 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17258 res=1 18:20:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:00 executing program 1: 18:20:00 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:20:00 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:00 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f"], 0x43) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:00 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:00 executing program 1: [ 509.617346][ T25] audit: type=1804 audit(1572373200.947:103): pid=12171 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17261 res=1 18:20:01 executing program 1: 18:20:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:01 executing program 1: 18:20:01 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 18:20:01 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:01 executing program 1: 18:20:01 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f"], 0x43) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:01 executing program 0: getpid() r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:01 executing program 1: [ 510.801923][ T25] audit: type=1804 audit(1572373202.127:104): pid=12193 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17272 res=1 18:20:02 executing program 0: getpid() r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:02 executing program 1: [ 511.144933][ T25] audit: type=1804 audit(1572373202.467:105): pid=12198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17272 res=1 18:20:02 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:02 executing program 0: getpid() r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, r0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:02 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:02 executing program 1: [ 511.489267][ T25] audit: type=1804 audit(1572373202.807:106): pid=12205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17253 res=1 18:20:02 executing program 1: 18:20:02 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e55"], 0x64) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:02 executing program 0: r0 = open(0x0, 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:03 executing program 1: [ 511.889986][ T25] audit: type=1804 audit(1572373203.217:107): pid=12221 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17273 res=1 18:20:03 executing program 0: r0 = open(0x0, 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:03 executing program 1: 18:20:03 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 512.269081][ T25] audit: type=1804 audit(1572373203.597:108): pid=12228 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17025 res=1 18:20:03 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:03 executing program 0: r0 = open(0x0, 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:03 executing program 1: unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x4, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)="662f651e93b2fe337fc075b805856ec68a83f474", &(0x7f0000000280)=""/194, 0x4}, 0x20) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() 18:20:04 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e55"], 0x64) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 512.724858][ T25] audit: type=1804 audit(1572373204.047:109): pid=12239 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17260 res=1 18:20:04 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 512.837036][T12242] bond0: (slave bond_slave_1): Releasing backup interface 18:20:04 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 513.100787][ T25] audit: type=1804 audit(1572373204.427:110): pid=12253 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17286 res=1 18:20:04 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:04 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 513.598917][ T25] audit: type=1804 audit(1572373204.927:111): pid=12259 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17286 res=1 18:20:05 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:05 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e55"], 0x64) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 514.199028][ T25] audit: type=1804 audit(1572373205.517:112): pid=12266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17277 res=1 18:20:05 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(0x0, 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:05 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:05 executing program 1: unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x4, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)="662f651e93b2fe337fc075b805856ec68a83f474", &(0x7f0000000280)=""/194, 0x4}, 0x20) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() [ 514.659484][ T25] audit: type=1804 audit(1572373205.987:113): pid=12281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17281 res=1 18:20:06 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:06 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e747"], 0x75) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:06 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(0x0, 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:06 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x3, 0x0, 0x0) [ 515.806774][ T25] audit: type=1804 audit(1572373207.137:114): pid=12303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17289 res=1 18:20:07 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 18:20:07 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e747"], 0x75) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:07 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(0x0, 0x1000, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:07 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) [ 516.848272][ T25] audit: type=1804 audit(1572373208.177:115): pid=12333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17299 res=1 18:20:08 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:08 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 18:20:08 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:08 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e747"], 0x75) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:09 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:09 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:09 executing program 1: getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x1bd, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x6, 0x0, 0x0) [ 518.039005][ T25] audit: type=1804 audit(1572373209.367:116): pid=12365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17300 res=1 18:20:09 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00'}, 0x30) 18:20:09 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaa"], 0x7d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:09 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:09 executing program 1: pipe(0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) 18:20:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040), 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:10 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:10 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:10 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 519.051837][ T25] audit: type=1804 audit(1572373210.377:117): pid=12391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17301 res=1 18:20:10 executing program 1: r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ftruncate(0xffffffffffffffff, 0x2007fff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0xe) syz_open_procfs(0x0, 0x0) r2 = socket(0x400000000000010, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, 0x0, 0x0) write(r2, &(0x7f00000000c0), 0x1fd) openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x400, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) arch_prctl$ARCH_SET_GS(0x1001, 0x6) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x1c0000}) 18:20:10 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaa"], 0x7d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:10 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:11 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e", 0xc) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:11 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040), 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:11 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:11 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x4) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) syz_emit_ethernet(0x32, &(0x7f0000000000)={@random="29b2970f3d70", @broadcast, [{[{0x9100, 0x3, 0x1, 0x3}], {0x8100, 0x6, 0x0, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3c, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @local, @multicast1}, @icmp=@address_reply={0x60}}}}}, 0x0) [ 520.232701][ T25] audit: type=1804 audit(1572373211.557:118): pid=12425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17295 res=1 18:20:11 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e", 0xc) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:11 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaa"], 0x7d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x8) r1 = socket$rds(0x15, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 18:20:12 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:12 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e", 0xc) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000100)={0x3, 0x98f90a}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000100)={0x3, 0x98f90a}) 18:20:12 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x0, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040), 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:12 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:12 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x2, 0x5800) [ 521.392111][ T25] audit: type=1804 audit(1572373212.717:119): pid=12461 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17295 res=1 18:20:12 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f21"], 0x81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:12 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:13 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0xd0, &(0x7f0000000000), &(0x7f00000000c0)=0x1be) 18:20:13 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 18:20:13 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x0, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:13 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0xd23e41, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x1, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r2, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\x00', 0x25, 0x3) r3 = getpgrp(0x0) setpriority(0x0, r3, 0x100) read(r0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0xdfffffff, 0x21000) gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$setopts(0x4206, r5, 0x0, 0x0) r6 = syz_open_procfs(0x0, 0x0) preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) fcntl$getownex(r6, 0x10, &(0x7f0000000280)) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) ptrace$setopts(0x4206, r7, 0x0, 0x0) setpgid(r7, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r8) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x0) gettid() gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000600)='./file0\x00', &(0x7f0000000800)=[&(0x7f0000000680)='\x00', &(0x7f0000000700)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\xef', &(0x7f0000000740)='\x00', &(0x7f00000007c0)='&\x00'], &(0x7f0000000780)=[&(0x7f0000000480)='security.selinux\x00', &(0x7f00000002c0)='proc\x00']) 18:20:13 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) [ 522.345017][ T25] audit: type=1804 audit(1572373213.677:120): pid=12487 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17309 res=1 18:20:14 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f21"], 0x81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:14 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:14 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x0, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:14 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0xd23e41, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x1, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r2, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000a00)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\x00', 0x25, 0x3) r3 = getpgrp(0x0) setpriority(0x0, r3, 0x100) read(r0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0xdfffffff, 0x21000) gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$setopts(0x4206, r5, 0x0, 0x0) r6 = syz_open_procfs(0x0, 0x0) preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) fcntl$getownex(r6, 0x10, &(0x7f0000000280)) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) ptrace$setopts(0x4206, r7, 0x0, 0x0) setpgid(r7, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r8) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x0) gettid() gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000600)='./file0\x00', &(0x7f0000000800)=[&(0x7f0000000680)='\x00', &(0x7f0000000700)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\xef', &(0x7f0000000740)='\x00', &(0x7f00000007c0)='&\x00'], &(0x7f0000000780)=[&(0x7f0000000480)='security.selinux\x00', &(0x7f00000002c0)='proc\x00']) [ 523.413649][ T25] audit: type=1804 audit(1572373214.737:121): pid=12516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17309 res=1 18:20:14 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) 18:20:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:14 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f21"], 0x81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:15 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:15 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b"], 0x83) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:15 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x0, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:15 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0), 0xd23e41, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x0, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, 0x0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x1, 0x8}, 0xb) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000500)=0xc) ptrace$setopts(0x7abb990919170921, r2, 0x10001, 0x111) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000a00)={"c5c48455550c5f15d6a1e54e8434d392b1ee8ce0d8cc789e6f9f5fff37ea66e3ca2631545d2fac4abc17eb7ac022137c40ce9850330e934af106b6d2b7b23ab19ac6157f94543f7759d7d90386c0a66d13d3e29cd3c6af3aacf0403dfd57a8f8135dc35686b0919abd7055617083c2d27e3b8f482c0f739c8d5b6b8550e111346a569c4ef7974920a0d7d047f3aa354d1ecdd6032a60c603c404884d346b4f5f2a11da56be949d0f7631fc8cfaaad5c4a62696e3e255e89ea6a55cd3d7c072f17a1259489e5c8c35e774bdf939b28c750dbbcabb6f8243e7ddc524c53053d507b8d8841c66088bb387c003a38c6b56c6d3943436d3bfaee3a64f70cf0786eeefcb20c20d6ccab79d6b56c389e2c2036dd5c530cf9375fcdfc5c64ed37d249442e633724fc2a1c05ceb01c61a1ec83aa77af2a86431dbd70b1f57d83b558d5b7f991e59e4de3d94ecfd0d1ee35e28b03fc0c4edf919b649dbe0bee545c8a523de067f6d4c93585430d396a84a8128244e7880b3fb27d3e25bbdae3248a60f3835a8e5c1b8ec9054f0b28c3b8f3bb8805756908d313f77fe38934b57b1626bf795f20ded88ac5593dfd331d6ee199ae59864a789c50a0716705a5066680491ae4865f94eb777f1af9cecf98eba79e57ba4f056fc2faafc2b6b876323a192fad3e9e2328191df6def6cc8a74e7bf7032a69810371780f6035b205461f06194bee219f01225d7770067d4b8368b6e76cad966e9c68b3fa9129196dc06422e56a72c96dd97c436c97fc9c0fafbe9a70db131c4ccc0c16e37b3dd16b47c80c8dbf457f5eeb2a0bd1bd121d55092b7a421af41520af3a14d021ac7a5b687be522b7077604441a420679cc1f7dc60c6a7a9c38d5cc925f45180bf6c3d03296df35e80cee74a9d5112ad31d9f73a929f26ab98b78034136f5c780db45f6685ef241766a1b1e6b1022867fee580f6d4edd7209d80a69d5a9c14f5c8f40d0146fd345c293f8f528fd0f769ba1d3e1afb2d7ecc7642d84f5427bc7eb8d3df8587fdf9c8a1ae6fb8da5f4c7f41dcc4357aa174bc748f2b7b936acf1a571b37051f582e64662547b5b5a300dad70abe401d31ab0ee0f954836e504b2600fac22a7563f765a5e28a9c8e5070f87c7108d2bba9dd471e07f853794ecc5b07ed9613474efee45e3cbf4d1e8731f6f2fc4916eeb5477e38618149221fdcb7fa0b96dc6d93300310ac036e2bca6de88be17d01ef15da72524dc3c3414aeb8035892e6cb9a8a8e0ede1f083fe121e6d968e2c5974db5a86f9087e11c0e07ed02df3cf64be47e80c63925975d2514335b6cd952154bbc1bf2b52adf0c6529d9d05acf16f5b2178395e7df8ad6223d19a38d63d6785ef1fc69100b79a92325e358f75f8213f858e725fc0c1246ad2f0c1cdb3fc933e7ba971de2707689bfe56cc62cb0179b090d83435d3b"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\x00', 0x25, 0x3) r3 = getpgrp(0x0) setpriority(0x0, r3, 0x100) read(r0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0xdfffffff, 0x21000) gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$setopts(0x4206, r5, 0x0, 0x0) r6 = syz_open_procfs(0x0, 0x0) preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) fcntl$getownex(r6, 0x10, &(0x7f0000000280)) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) ptrace$setopts(0x4206, r7, 0x0, 0x0) setpgid(r7, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r8) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x0) gettid() gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f00000005c0)='/dev/loop#\x00', 0x0, 0x182) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000600)='./file0\x00', &(0x7f0000000800)=[&(0x7f0000000680)='\x00', &(0x7f0000000700)='system_u:obj\x0f\xae\xc4\x1ds:auditctl_dxec_t:s0\xef', &(0x7f0000000740)='\x00', &(0x7f00000007c0)='&\x00'], &(0x7f0000000780)=[&(0x7f0000000480)='security.selinux\x00', &(0x7f00000002c0)='proc\x00']) [ 524.534388][ T25] audit: type=1804 audit(1572373215.857:122): pid=12549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17258 res=1 18:20:15 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:15 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) 18:20:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:16 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:16 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b"], 0x83) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:16 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x0, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memor\x9a.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.high\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000380)=""/4096) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000300)=""/8) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) write$cgroup_int(r2, 0x0, 0x0) [ 525.474421][ T25] audit: type=1804 audit(1572373216.807:123): pid=12581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17323 res=1 18:20:17 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 18:20:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:17 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x0, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:17 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:17 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b"], 0x83) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 526.179549][ T25] audit: type=1804 audit(1572373217.507:124): pid=12595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16707 res=1 18:20:18 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:18 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:18 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:18 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) [ 526.842221][ T25] audit: type=1804 audit(1572373218.167:125): pid=12604 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16707 res=1 18:20:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:18 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memor\x9a.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.high\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000380)=""/4096) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000300)=""/8) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) write$cgroup_int(r2, 0x0, 0x0) 18:20:19 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:19 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:19 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 18:20:19 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97"], 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 528.572338][ T25] audit: type=1804 audit(1572373219.897:126): pid=12642 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16722 res=1 18:20:20 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x105, 0x101b, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r4, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:20 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:20 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 529.133084][ T25] audit: type=1804 audit(1572373220.457:127): pid=12649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16625 res=1 18:20:20 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:20 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x0, 0x0) 18:20:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memor\x9a.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.high\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000380)=""/4096) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000300)=""/8) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) write$cgroup_int(r2, 0x0, 0x0) 18:20:26 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:26 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:26 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:26 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x0, 0x0) [ 534.818134][ T25] audit: type=1804 audit(1572373226.147:128): pid=12678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16674 res=1 18:20:26 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:26 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 535.014708][ T25] audit: type=1804 audit(1572373226.337:129): pid=12687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16577 res=1 18:20:26 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:26 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:26 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:26 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 535.387738][ T25] audit: type=1804 audit(1572373226.717:130): pid=12692 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16577 res=1 [ 535.607907][ T25] audit: type=1804 audit(1572373226.937:131): pid=12701 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16577 res=1 18:20:32 executing program 1: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountstats\x00') preadv(r0, 0x0, 0x0, 0x400000000000) syz_open_procfs(0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x1e0, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) ioctl$KDGKBLED(r2, 0x4b64, 0x0) linkat(0xffffffffffffffff, 0x0, r2, 0x0, 0x800) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010802000000000000", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b000000000074fd02d766ff61ea0fed87e6b17f1e623002edf035b6f556dc7cfe2a24efbbc264d4f6194e4c51a9262f4214e2cb9208c80a0b75e4bcbf5d3d1938d79d50d894289ebb327162"], 0x3}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 18:20:32 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:32 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x0, 0x0) 18:20:32 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:32 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 541.111115][ T25] audit: type=1804 audit(1572373232.437:132): pid=12715 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16722 res=1 18:20:32 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:32 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 541.348525][ T25] audit: type=1804 audit(1572373232.677:133): pid=12723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16706 res=1 18:20:32 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:32 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:32 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 541.566860][ T25] audit: type=1804 audit(1572373232.887:134): pid=12730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16610 res=1 18:20:33 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 541.889832][ T25] audit: type=1804 audit(1572373233.217:135): pid=12739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16674 res=1 18:20:39 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaa"], 0x7d) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x0) bind$inet6(r1, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:39 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:39 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x0, {0x0, [{{0x2, 0x4}, 0x3, 0x1f, 0x7, './file0'}, {{0xb4, 0x2, 0x4}, 0x8, 0x1d, 0x7, './file0'}, {{0x8, 0x1, 0x3}, 0x814d, 0x1b, 0x7, './file0'}, {{0x8, 0x2}, 0x0, 0x1, 0x7, './file0'}]}}, 0x87) r3 = socket$packet(0x11, 0x3, 0x300) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 18:20:39 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:39 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 548.517842][ T25] audit: type=1804 audit(1572373239.847:136): pid=12756 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16746 res=1 18:20:39 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:40 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 548.859735][ T25] audit: type=1804 audit(1572373240.187:137): pid=12764 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16751 res=1 18:20:40 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}, {0x0, 0x0, 0x0}], 0x4, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:40 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:40 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 549.114222][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 549.120095][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 549.274221][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 549.280109][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:20:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 549.316980][ T25] audit: type=1804 audit(1572373240.647:138): pid=12772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16751 res=1 18:20:48 executing program 1: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000980)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4068aea3, &(0x7f0000000080)={0x94}) r4 = dup3(r1, r2, 0x0) dup2(r4, r3) 18:20:48 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:48 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:48 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, 0x0, 0x0, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:48 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x0, {0x0, [{{0x2, 0x4}, 0x3, 0x1f, 0x7, './file0'}, {{0xb4, 0x2, 0x4}, 0x8, 0x1d, 0x7, './file0'}, {{0x8, 0x1, 0x3}, 0x814d, 0x1b, 0x7, './file0'}, {{0x8, 0x2}, 0x0, 0x1, 0x7, './file0'}]}}, 0x87) r3 = socket$packet(0x11, 0x3, 0x300) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 18:20:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 557.032911][ T25] audit: type=1804 audit(1572373248.357:139): pid=12794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16610 res=1 18:20:48 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f"], 0x43) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 557.438159][ T25] audit: type=1804 audit(1572373248.767:140): pid=12809 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16610 res=1 [ 557.458305][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 557.458364][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:20:48 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 557.594212][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 557.600085][ C0] protocol 88fb is buggy, dev hsr_slave_1 18:20:49 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, 0x0, 0x0, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:20:49 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000180)={0x87, 0x29, 0x8002, {0x0, [{{0x0, 0x4}, 0x3, 0x1f, 0x7, './file0'}, {{0x0, 0x2}, 0x8, 0x1d, 0x7, './file0'}, {{0x8}, 0x814d, 0x1b, 0x7, './file0'}, {{0x8}, 0x0, 0x0, 0x7, './file0'}]}}, 0x87) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 18:20:49 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 558.234243][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 558.240093][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 558.474216][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 558.480038][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 558.634213][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 558.640048][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:20:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:20:53 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f"], 0x43) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:53 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:53 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, 0x0, 0x0, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:20:53 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000180)={0x87, 0x29, 0x8002, {0x0, [{{0x0, 0x4}, 0x3, 0x1f, 0x7, './file0'}, {{0x0, 0x2}, 0x8, 0x1d, 0x7, './file0'}, {{0x8}, 0x814d, 0x1b, 0x7, './file0'}, {{0x8}, 0x0, 0x0, 0x7, './file0'}]}}, 0x87) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 18:20:53 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 562.250189][ T25] audit: type=1804 audit(1572373253.577:141): pid=12849 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16847 res=1 18:20:53 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 562.644280][ C1] net_ratelimit: 2 callbacks suppressed [ 562.644355][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 562.656064][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 562.794208][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 562.800064][ C1] protocol 88fb is buggy, dev hsr_slave_1 18:20:54 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}], 0x3, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:54 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:20:54 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f"], 0x43) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 563.430628][ T25] audit: type=1804 audit(1572373254.757:142): pid=12869 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16882 res=1 18:20:59 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000480)={0x0, 0x12}, &(0x7f0000044000)) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) getpid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) 18:20:59 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:59 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}], 0x3, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:20:59 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003600)='tunl0\x003;\xb6n\\\x9d\x8f\xdf\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7d20, 0x0, &(0x7f00000001c0), 0x10) 18:20:59 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e55"], 0x64) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:20:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:20:59 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 568.559108][ T25] audit: type=1804 audit(1572373259.887:143): pid=12887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17233 res=1 18:21:00 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003600)='tunl0\x003;\xb6n\\\x9d\x8f\xdf\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7d20, 0x0, &(0x7f00000001c0), 0x10) 18:21:00 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:00 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {&(0x7f0000002040)=@in6={0xa, 0x4e22, 0x6, @mcast2}, 0x1c, &(0x7f0000002600)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000002780)=[@sndinfo={0x20, 0x84, 0x2, {0x100, 0x8000}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @authinfo={0x18, 0x84, 0x6, {0xffff}}, @sndinfo={0x20}], 0x70, 0x4000}], 0x3, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:21:00 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003600)='tunl0\x003;\xb6n\\\x9d\x8f\xdf\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7d20, 0x0, &(0x7f00000001c0), 0x10) 18:21:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 18:21:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003600)='tunl0\x003;\xb6n\\\x9d\x8f\xdf\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7d20, 0x0, &(0x7f00000001c0), 0x10) 18:21:09 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:09 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e55"], 0x64) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:09 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {&(0x7f0000001680)=@in6={0xa, 0x4e21, 0x1, @empty, 0x7fffffff}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x8002, 0x6, 0x1}}], 0x20, 0x4}, {0x0, 0x0, 0x0}], 0x3, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:21:09 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003600)='tunl0\x003;\xb6n\\\x9d\x8f\xdf\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7d20, 0x0, &(0x7f00000001c0), 0x10) 18:21:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 577.893766][ T25] audit: type=1804 audit(1572373269.217:144): pid=12926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17343 res=1 18:21:09 executing program 3: socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x0, 0x0, @dev}}, 0x8, 0x0, 0x3ff, 0x0, 0x80}, 0x98) r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000240)) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x60) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000000000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) shmctl$SHM_STAT(r3, 0xd, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000080)) close(0xffffffffffffffff) 18:21:09 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:09 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)="41fea3c500cf1c25446f7cc8acab91b94c335f7b3663f1cfcdd26057521975580c78f67ad7758c06ff3aeca28a7abb10a9335efa6c2420ba6d802d5b62d5fb106d60f9223c7a84888621c486987b6781ad0fe320c8eca2fa42cab9410173ffc795366fada4885b6a3cb2696af6cf337e2e3a4ed7e0f2df9247a6306d16592005a8733dc8eb3fdc84be6a66fe254ff8582d03e4a4fe8417e865f3e3b1eb3d3783f192f6b0f0ad92f1baa5f10bc1a2817b32", 0xb1}, {&(0x7f0000000240)="94eabd71036c332cd7d0dd2ed4c19a8caf97083d7cef3447761552", 0x1b}, {&(0x7f0000000280)="ab31804b263233b8debc665f4b00ebcbf9798fd14546ceaabcaa86a310a2d2f52b59c0", 0x23}, {&(0x7f00000002c0)="8591625f37e81a6b11e6a8b24a112b231767d48313617b", 0x17}, {&(0x7f0000000300)}, {&(0x7f0000001300)="4cd697cd0d59e79865096960f1196b13cde1f3195dc74a70a977f09ce96ab111b24a80ad40db704aaeb3a9cbef9c01be53d8042490758ce3b80091fd5176857acc915172196625dec68177ba1a4d575e122ea45b", 0x54}, {&(0x7f00000013c0)="228dbbe51312bd3756309b2bca7d6775e38084b7dc3530e5fa87737999d0721a2526314a2f575a65d8ae56d54492957b87e093bceef7158f41ba8c4ca1f81eb72cf89981b45300e71085b638a7046fab9163889eb3b9712fd699ec11743fd643b9173ff95190988059cb08760a69128e94ab12391283ebfe0e943815df259b", 0x7f}], 0x7, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {0x0, 0x0, 0x0}], 0x2, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:21:09 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfd6e) write$P9_RUNLINKAT(r1, &(0x7f0000000140)={0x7, 0x4d, 0x1}, 0x7) eventfd(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup2(r3, r4) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000500)=ANY=[@ANYBLOB="0000000000000000e0010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001080000000000000100008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a4f56d6f4398c54117d0731ab581cfd28d6ec27ec504a6f3371cfe5987c9d759a0bc3cce3a85f346acc6b0b6d9ba3a32aa7e9402b556727b88d3c781e66d9d6157768a4772590592468864f63c2772199d9dd2cb71feddc3bd587df021e4560a7c8bede8ad47bf2e82ddf608e2b73e08e133ee25b75e364ae36f3e263596b065b18080d2716e7c732c3898258c5c99b4e592fd655bc6299fbf9d96b0f2a79e1a7c5a0b1d61e6c674b1a4b0b7e68213c468104eb51c0f37540eec1ed3184cb5fd71e900b0985cd46168117e001bd8"]) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'filter\x00'}, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00\x00\x00\x96x\x01\x00\x13\xba\xeb\x00\x00\x00\x00\x00\x8b\x17\xd9\x00\x00') accept4(0xffffffffffffffff, &(0x7f00000001c0)=@can, &(0x7f0000000100)=0x80, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) 18:21:09 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:21:15 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003600)='tunl0\x003;\xb6n\\\x9d\x8f\xdf\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7d20, 0x0, &(0x7f00000001c0), 0x10) 18:21:15 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e55"], 0x64) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:15 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, 0x0, 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:15 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r2, 0x4, 0x40400) r3 = open(&(0x7f0000000340)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0x323) write$FUSE_WRITE(r2, &(0x7f0000000080)={0xfffffffffffffd7f}, 0x18) 18:21:15 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, 0x0}], 0x1, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:21:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:21:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000002c0)=0x68) [ 584.227365][ T25] audit: type=1804 audit(1572373275.557:145): pid=12973 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17365 res=1 18:21:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) prctl$PR_SET_KEEPCAPS(0x8, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$kcm(0xa, 0x2, 0x73) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 18:21:16 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, 0x0}], 0x1, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 584.892982][T12979] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.901411][T12979] bridge0: port 1(bridge_slave_0) entered disabled state 18:21:16 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, 0x0, 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 18:21:16 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e747"], 0x75) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 585.598806][ T25] audit: type=1804 audit(1572373276.927:146): pid=12994 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16689 res=1 [ 587.144970][ T7284] device bridge_slave_1 left promiscuous mode [ 587.151162][ T7284] bridge0: port 2(bridge_slave_1) entered disabled state [ 587.195185][ T7284] device bridge_slave_0 left promiscuous mode [ 587.201364][ T7284] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.964411][ T7284] device hsr_slave_0 left promiscuous mode [ 588.004249][ T7284] device hsr_slave_1 left promiscuous mode [ 588.071304][ T7284] team0 (unregistering): Port device team_slave_1 removed [ 588.082297][ T7284] team0 (unregistering): Port device team_slave_0 removed [ 588.092830][ T7284] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 588.149189][ T7284] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 588.220376][ T7284] bond0 (unregistering): Released all slaves 18:21:22 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003600)='tunl0\x003;\xb6n\\\x9d\x8f\xdf\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7d20, 0x0, &(0x7f00000001c0), 0x10) 18:21:22 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, 0x0}], 0x1, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:21:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) prctl$PR_SET_KEEPCAPS(0x8, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$kcm(0xa, 0x2, 0x73) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 18:21:22 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e747"], 0x75) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:22 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, 0x0, 0x4a0104, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) [ 591.487715][ T25] audit: type=1804 audit(1572373282.817:147): pid=13015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16505 res=1 18:21:23 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:23 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {0x0, 0x0, 0x0}], 0x2, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:21:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 18:21:23 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e747"], 0x75) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 592.249613][ T25] audit: type=1804 audit(1572373283.577:148): pid=13020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/272/file0" dev="sda1" ino=16898 res=1 [ 592.640695][ T25] audit: type=1804 audit(1572373283.967:149): pid=13029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=16914 res=1 18:21:24 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {0x0, 0x0, 0x0}], 0x2, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:21:24 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) [ 593.263888][ T25] audit: type=1804 audit(1572373284.587:150): pid=13036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/273/file0" dev="sda1" ino=16962 res=1 [ 594.571689][T13041] IPVS: ftp: loaded support on port[0] = 21 [ 594.629904][T13041] chnl_net:caif_netlink_parms(): no params data found [ 594.660678][T13041] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.667779][T13041] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.675848][T13041] device bridge_slave_0 entered promiscuous mode [ 594.683292][T13041] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.690415][T13041] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.698326][T13041] device bridge_slave_1 entered promiscuous mode [ 594.717586][T13041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 594.728289][T13041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 594.749176][T13041] team0: Port device team_slave_0 added [ 594.755908][T13041] team0: Port device team_slave_1 added [ 594.807488][T13041] device hsr_slave_0 entered promiscuous mode [ 594.864521][T13041] device hsr_slave_1 entered promiscuous mode [ 594.924295][T13041] debugfs: Directory 'hsr0' with parent '/' already present! [ 594.939633][T13041] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.946882][T13041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 594.954244][T13041] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.961279][T13041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 594.994505][T13041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 595.006875][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 595.015415][ T41] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.023405][ T41] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.033297][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 595.046344][T13041] 8021q: adding VLAN 0 to HW filter on device team0 [ 595.057131][ T2879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 595.065964][ T2879] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.072989][ T2879] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.096727][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 595.105409][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.112426][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.121691][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 595.130850][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 595.139866][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 595.148394][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 595.161331][T13041] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 595.172795][T13041] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 595.186808][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 595.202891][T13041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 595.349676][T13049] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.357999][T13049] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.717232][ T837] device bridge_slave_1 left promiscuous mode [ 596.723510][ T837] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.784910][ T837] device bridge_slave_0 left promiscuous mode [ 596.791142][ T837] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.554357][ T837] device hsr_slave_0 left promiscuous mode [ 597.614297][ T837] device hsr_slave_1 left promiscuous mode [ 597.673911][ T837] team0 (unregistering): Port device team_slave_1 removed [ 597.685676][ T837] team0 (unregistering): Port device team_slave_0 removed [ 597.696904][ T837] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 597.748524][ T837] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 597.809799][ T837] bond0 (unregistering): Released all slaves 18:21:29 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003600)='tunl0\x003;\xb6n\\\x9d\x8f\xdf\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7d20, 0x0, &(0x7f00000001c0), 0x10) 18:21:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@updsa={0xf0, 0x1a, 0x205, 0x0, 0x0, {{@in6=@mcast1, @in6=@empty}, {@in=@multicast1}, @in=@loopback}}, 0xf0}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 18:21:29 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaa"], 0x7d) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000380)={{0x7f, 0x8}, {0x1f, 0x7}, 0x1, 0x2, 0xf4}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4a0104, 0x44) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e23, 0xfff, @dev={0xfe, 0x80, [], 0x18}, 0xffffffff}, 0x1c) r5 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$capi20(r5, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:29 executing program 4: r0 = syz_open_dev$midi(0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) sendmmsg$inet_sctp(r1, &(0x7f0000005080)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x200, 0x0, 0x1}}], 0x20, 0x20000000}, {0x0, 0x0, 0x0}], 0x2, 0xb4af37cf9f4efe4) perf_event_open(&(0x7f000001d000)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 18:21:29 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="ed8ed24112ccba9ecbaea5e8dd240c1e5d9836bb72b0f96a9cbad007f24b3ac25dc81c2b7c8c5b06d007e4c0072fab72c7d711beb15f4313966fe3a42d5e075205917f03000000030b6daa6e72ad000000610000000000000001a25a382ed7fbcbbc4e5508505d08b26f5521b1ac0543976167e74735bfeb92974cfcaadd589f212c8b97b6"], 0x85) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x44) write$capi20(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x2, 0x5, 0x80, 0x1, 0x1ff}, 0x10) 18:21:29 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x161600) [ 598.668794][ T25] audit: type=1804 audit(1572373289.997:151): pid=13059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="file0" dev="sda1" ino=17057 res=1 [ 598.739356][ T25] audit: type=1804 audit(1572373290.037:152): pid=13061 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir206891310/syzkaller.klT5Zv/274/file0" dev="sda1" ino=17105 res=1 [ 599.077284][T13052] ================================================================== [ 599.085419][T13052] BUG: KCSAN: data-race in fsnotify / fsnotify [ 599.091563][T13052] [ 599.093897][T13052] write to 0xffff8881254929d0 of 4 bytes by task 13058 on cpu 1: [ 599.101614][T13052] fsnotify+0x41e/0x7d0 [ 599.105769][T13052] do_iter_write+0x218/0x3c0 [ 599.110352][T13052] vfs_iter_write+0x5c/0x80 [ 599.114855][T13052] iter_file_splice_write+0x4c0/0x7f0 [ 599.120223][T13052] direct_splice_actor+0xa0/0xc0 [ 599.125156][T13052] splice_direct_to_actor+0x215/0x510 [ 599.130524][T13052] do_splice_direct+0x161/0x1e0 [ 599.135370][T13052] do_sendfile+0x384/0x7f0 [ 599.139784][T13052] __x64_sys_sendfile64+0xbe/0x140 [ 599.144892][T13052] do_syscall_64+0xcc/0x370 [ 599.149396][T13052] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 599.155277][T13052] [ 599.157602][T13052] read to 0xffff8881254929d0 of 4 bytes by task 13052 on cpu 0: [ 599.165231][T13052] fsnotify+0x4c1/0x7d0 [ 599.169383][T13052] do_iter_write+0x218/0x3c0 [ 599.173975][T13052] vfs_iter_write+0x5c/0x80 [ 599.178478][T13052] iter_file_splice_write+0x4c0/0x7f0 [ 599.183851][T13052] direct_splice_actor+0xa0/0xc0 [ 599.188786][T13052] splice_direct_to_actor+0x215/0x510 [ 599.194158][T13052] do_splice_direct+0x161/0x1e0 [ 599.199003][T13052] do_sendfile+0x384/0x7f0 [ 599.203423][T13052] __x64_sys_sendfile64+0xbe/0x140 [ 599.208533][T13052] do_syscall_64+0xcc/0x370 [ 599.213035][T13052] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 599.218919][T13052] [ 599.221234][T13052] Reported by Kernel Concurrency Sanitizer on: [ 599.227380][T13052] CPU: 0 PID: 13052 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 599.235261][T13052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.245306][T13052] ================================================================== [ 599.253361][T13052] Kernel panic - not syncing: panic_on_warn set ... [ 599.259942][T13052] CPU: 0 PID: 13052 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 599.267837][T13052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.277880][T13052] Call Trace: [ 599.281175][T13052] dump_stack+0xf5/0x159 [ 599.285415][T13052] panic+0x210/0x640 [ 599.289315][T13052] ? __x64_sys_sendfile64+0xbe/0x140 [ 599.294595][T13052] ? vprintk_func+0x8d/0x140 [ 599.299185][T13052] kcsan_report.cold+0xc/0x10 [ 599.303866][T13052] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 599.309408][T13052] __tsan_read4+0x2c/0x30 [ 599.313735][T13052] fsnotify+0x4c1/0x7d0 [ 599.317895][T13052] do_iter_write+0x218/0x3c0 [ 599.322492][T13052] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 599.328116][T13052] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 599.333753][T13052] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 599.339647][T13052] vfs_iter_write+0x5c/0x80 [ 599.344149][T13052] iter_file_splice_write+0x4c0/0x7f0 [ 599.349541][T13052] ? page_cache_pipe_buf_release+0x100/0x100 [ 599.355525][T13052] direct_splice_actor+0xa0/0xc0 [ 599.360464][T13052] splice_direct_to_actor+0x215/0x510 [ 599.365829][T13052] ? generic_pipe_buf_nosteal+0x20/0x20 [ 599.371373][T13052] do_splice_direct+0x161/0x1e0 [ 599.376225][T13052] do_sendfile+0x384/0x7f0 [ 599.380643][T13052] __x64_sys_sendfile64+0xbe/0x140 [ 599.385753][T13052] do_syscall_64+0xcc/0x370 [ 599.390263][T13052] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 599.396149][T13052] RIP: 0033:0x459f49 [ 599.400042][T13052] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 599.419641][T13052] RSP: 002b:00007efc5e5eac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 599.428072][T13052] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459f49 [ 599.436038][T13052] RDX: 00000000200001c0 RSI: 0000000000000003 RDI: 0000000000000003 [ 599.444022][T13052] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 599.451990][T13052] R10: 000000000000a198 R11: 0000000000000246 R12: 00007efc5e5eb6d4 [ 599.459953][T13052] R13: 00000000004c7b7f R14: 00000000004ddc78 R15: 00000000ffffffff [ 599.469201][T13052] Kernel Offset: disabled [ 599.473568][T13052] Rebooting in 86400 seconds..