dev="sda1" ino=16659 res=1 07:11:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="006386dd05"], 0x90ad) [ 1076.337890][T20894] IPVS: ftp: loaded support on port[0] = 21 [ 1076.388688][T20894] chnl_net:caif_netlink_parms(): no params data found [ 1076.414164][T20894] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.421307][T20894] bridge0: port 1(bridge_slave_0) entered disabled state [ 1076.429361][T20894] device bridge_slave_0 entered promiscuous mode [ 1076.436607][T20894] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.443887][T20894] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.451610][T20894] device bridge_slave_1 entered promiscuous mode [ 1076.468928][T20894] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1076.480073][T20894] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1076.497913][T20894] team0: Port device team_slave_0 added [ 1076.505068][T20894] team0: Port device team_slave_1 added [ 1076.560739][T20894] device hsr_slave_0 entered promiscuous mode [ 1076.608785][T20894] device hsr_slave_1 entered promiscuous mode [ 1076.648385][T20894] debugfs: Directory 'hsr0' with parent '/' already present! [ 1076.662564][T20894] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.669608][T20894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1076.677047][T20894] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.684119][T20894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1076.713385][T20894] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1076.725515][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1076.733871][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1076.742018][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.753941][T20894] 8021q: adding VLAN 0 to HW filter on device team0 [ 1076.764338][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1076.772969][T19395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.780172][T19395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1076.800325][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1076.808949][ T7647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.815999][ T7647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1076.825004][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1076.834225][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1076.843134][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1076.856335][T20894] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1076.866989][T20894] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1076.878966][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1076.887465][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1076.895983][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1076.912011][T20894] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1076.920108][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1076.927448][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1077.048643][T20904] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1078.088960][T19966] device bridge_slave_1 left promiscuous mode [ 1078.095171][T19966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1078.129161][T19966] device bridge_slave_0 left promiscuous mode [ 1078.135434][T19966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1078.798653][T19966] device hsr_slave_0 left promiscuous mode [ 1078.868435][T19966] device hsr_slave_1 left promiscuous mode [ 1078.924760][T19966] team0 (unregistering): Port device team_slave_1 removed [ 1078.935141][T19966] team0 (unregistering): Port device team_slave_0 removed [ 1078.945685][T19966] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1078.982516][T19966] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1079.058762][T19966] bond0 (unregistering): Released all slaves 07:11:45 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280), 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x4200) r0 = open(0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r1 = socket(0x2, 0x3, 0x1) getsockopt(r1, 0xff, 0x1, 0x0, &(0x7f00003b7000)) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000200)="2465efa99de10306c5", 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x14000}, 0xc, 0x0}, 0x0) accept(0xffffffffffffffff, &(0x7f0000000980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000001}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7bf63282530360d2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000580)={0x3, 0x0, 0x245, 'queue0\x00', 0x6}) r6 = open(&(0x7f0000000040)='./bus\x00', 0x143042, 0x0) ftruncate(r6, 0x200004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r6, 0x0, 0x80001d00c0d0) 07:11:45 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:11:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x12, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x200}, 0x28) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0x0, 0x0, 0x101, 'queue1\x00'}) 07:11:45 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x3, &(0x7f0000000500)=[{0x0, 0x0, 0x2}, {&(0x7f00000002c0), 0x0, 0x4}, {0x0}], 0x1002, &(0x7f0000000580)=ANY=[]) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:11:45 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r1, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) recvmmsg(r2, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:11:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000140)=""/205, 0xcd}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r3, 0xffff, 0x1006, &(0x7f0000000000)={0x0, 0x10000}, 0x10) recvfrom$inet(r3, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r2, 0x0) shutdown(r3, 0x0) [ 1085.166485][ T26] audit: type=1800 audit(1574493105.800:1996): pid=20912 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16523 res=0 [ 1085.220862][ T26] audit: type=1804 audit(1574493105.840:1997): pid=20912 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/366/file0" dev="sda1" ino=16523 res=1 [ 1085.248818][ T26] audit: type=1800 audit(1574493105.840:1998): pid=20916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16520 res=0 07:11:45 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa, 0x0, 0x0, 0x20}) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000080)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$netlink(0x10, 0x3, 0x0) 07:11:46 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r1, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) recvmmsg(r2, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1085.504845][ T26] audit: type=1800 audit(1574493106.140:1999): pid=20928 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16562 res=0 07:11:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) setsockopt(r3, 0x1, 0x0, &(0x7f0000000000)="890538e4", 0x4) setsockopt(r3, 0x1, 0x9, &(0x7f0000000180), 0x1000001cd) 07:11:46 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r1, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) recvmmsg(r2, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:11:46 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1085.787464][ T26] audit: type=1800 audit(1574493106.420:2000): pid=20936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16547 res=0 [ 1085.861069][ T26] audit: type=1800 audit(1574493106.500:2001): pid=20939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16626 res=0 [ 1085.900338][ T26] audit: type=1804 audit(1574493106.520:2002): pid=20939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/367/file0" dev="sda1" ino=16626 res=1 07:11:46 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r1, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) recvmmsg(r2, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1087.358154][T20950] IPVS: ftp: loaded support on port[0] = 21 [ 1087.409602][T20950] chnl_net:caif_netlink_parms(): no params data found [ 1087.435011][T20950] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.442174][T20950] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.450160][T20950] device bridge_slave_0 entered promiscuous mode [ 1087.457575][T20950] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.464705][T20950] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.472661][T20950] device bridge_slave_1 entered promiscuous mode [ 1087.489124][T20950] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1087.500012][T20950] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1087.517700][T20950] team0: Port device team_slave_0 added [ 1087.524669][T20950] team0: Port device team_slave_1 added [ 1087.580324][T20950] device hsr_slave_0 entered promiscuous mode [ 1087.618772][T20950] device hsr_slave_1 entered promiscuous mode [ 1087.658337][T20950] debugfs: Directory 'hsr0' with parent '/' already present! [ 1087.673318][T20950] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.680348][T20950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1087.687614][T20950] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.694713][T20950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1087.723422][T20950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1087.734947][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1087.743288][T19914] bridge0: port 1(bridge_slave_0) entered disabled state [ 1087.751296][T19914] bridge0: port 2(bridge_slave_1) entered disabled state [ 1087.760274][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1087.772297][T20950] 8021q: adding VLAN 0 to HW filter on device team0 [ 1087.782959][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1087.791477][ T7869] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.798599][ T7869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1087.819772][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1087.828672][T19914] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.835701][T19914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1087.844367][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1087.853043][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1087.861818][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1087.870352][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1087.881822][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1087.891648][T20950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1087.905396][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1087.912984][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1087.923278][T20950] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1088.058940][T20960] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1089.148938][ T23] device bridge_slave_1 left promiscuous mode [ 1089.155097][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.219212][ T23] device bridge_slave_0 left promiscuous mode [ 1089.225415][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 1089.878524][ T23] device hsr_slave_0 left promiscuous mode [ 1089.928401][ T23] device hsr_slave_1 left promiscuous mode [ 1090.004441][ T23] team0 (unregistering): Port device team_slave_1 removed [ 1090.014663][ T23] team0 (unregistering): Port device team_slave_0 removed [ 1090.024681][ T23] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1090.081826][ T23] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1090.178551][ T23] bond0 (unregistering): Released all slaves 07:11:57 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) 07:11:57 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:11:57 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r1, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) recvmmsg(r2, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:11:57 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:11:57 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='mime_type:+GPLnodevGPL%keyring\x00', 0xfffffffffffffffe) 07:11:57 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @dev, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000280)={r2, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000340)=0x90) [ 1096.533509][ T26] audit: type=1800 audit(1574493117.170:2003): pid=20972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16519 res=0 [ 1096.564921][ T26] audit: type=1804 audit(1574493117.190:2004): pid=20972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/368/file0" dev="sda1" ino=16519 res=1 07:11:57 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r1, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) recvmmsg(r2, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:11:57 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1096.793784][ T26] audit: type=1800 audit(1574493117.430:2005): pid=20979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16643 res=0 [ 1096.858328][ T26] audit: type=1804 audit(1574493117.480:2006): pid=20980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/369/file0" dev="sda1" ino=16643 res=1 07:11:57 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1097.013914][ T26] audit: type=1800 audit(1574493117.650:2007): pid=20982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16657 res=0 [ 1097.044974][ T26] audit: type=1804 audit(1574493117.680:2008): pid=20982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/561/file0" dev="sda1" ino=16657 res=1 07:11:57 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1097.226426][ T26] audit: type=1800 audit(1574493117.860:2009): pid=20987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16643 res=0 [ 1097.272361][ T26] audit: type=1804 audit(1574493117.870:2010): pid=20987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/370/file0" dev="sda1" ino=16643 res=1 07:11:58 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x0, 0x0) r1 = getpgrp(0x0) setpriority(0x0, r1, 0x0) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter\x00') setpriority(0x0, 0x0, 0xffff) close(r0) 07:11:58 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1097.530887][ T26] audit: type=1800 audit(1574493118.170:2011): pid=20992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16643 res=0 [ 1097.605503][ T26] audit: type=1804 audit(1574493118.170:2012): pid=20992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/371/file0" dev="sda1" ino=16643 res=1 [ 1098.847525][T21004] IPVS: ftp: loaded support on port[0] = 21 [ 1098.899346][T21004] chnl_net:caif_netlink_parms(): no params data found [ 1098.925415][T21004] bridge0: port 1(bridge_slave_0) entered blocking state [ 1098.932589][T21004] bridge0: port 1(bridge_slave_0) entered disabled state [ 1098.940746][T21004] device bridge_slave_0 entered promiscuous mode [ 1098.948008][T21004] bridge0: port 2(bridge_slave_1) entered blocking state [ 1098.955200][T21004] bridge0: port 2(bridge_slave_1) entered disabled state [ 1098.963142][T21004] device bridge_slave_1 entered promiscuous mode [ 1098.979877][T21004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1098.990458][T21004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1099.008022][T21004] team0: Port device team_slave_0 added [ 1099.014821][T21004] team0: Port device team_slave_1 added [ 1099.090901][T21004] device hsr_slave_0 entered promiscuous mode [ 1099.148783][T21004] device hsr_slave_1 entered promiscuous mode [ 1099.208325][T21004] debugfs: Directory 'hsr0' with parent '/' already present! [ 1099.221846][T21004] bridge0: port 2(bridge_slave_1) entered blocking state [ 1099.228975][T21004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1099.236702][T21004] bridge0: port 1(bridge_slave_0) entered blocking state [ 1099.243739][T21004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1099.272823][T21004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1099.283738][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1099.292310][T20467] bridge0: port 1(bridge_slave_0) entered disabled state [ 1099.300287][T20467] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.309152][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1099.320588][T21004] 8021q: adding VLAN 0 to HW filter on device team0 [ 1099.331315][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1099.339625][ T7869] bridge0: port 1(bridge_slave_0) entered blocking state [ 1099.346626][ T7869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1099.357059][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1099.365613][T20467] bridge0: port 2(bridge_slave_1) entered blocking state [ 1099.372684][T20467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1099.392133][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1099.401036][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1099.410472][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1099.424606][T21004] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1099.435541][T21004] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1099.447898][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1099.457088][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1099.465424][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1099.479485][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1099.486965][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1099.496989][T21004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1099.655122][T21014] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1100.748821][ T23] device bridge_slave_1 left promiscuous mode [ 1100.755208][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 1100.809039][ T23] device bridge_slave_0 left promiscuous mode [ 1100.815237][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 1101.528660][ T23] device hsr_slave_0 left promiscuous mode [ 1101.578393][ T23] device hsr_slave_1 left promiscuous mode [ 1101.645102][ T23] team0 (unregistering): Port device team_slave_1 removed [ 1101.655218][ T23] team0 (unregistering): Port device team_slave_0 removed [ 1101.664920][ T23] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1101.711713][ T23] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1101.807995][ T23] bond0 (unregistering): Released all slaves 07:12:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) vmsplice(r4, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x5b22eb56399de2fa, &(0x7f0000009300)=ANY=[@ANYBLOB='fd=', @ANYBLOB="2c726f3030303030303030303030303030303030615f9dd8c8b78fe6e3b50e2286a4e3bb10cb54ffe16eb4020349e299892ef916f0ed3f384417a661a0d1fc44edb22801386ebd3a51bad113d4e404f5a0c221cc00"/98, @ANYRESDEC, @ANYBLOB="acecc11b1e6d541ca1cabe0b75", @ANYBLOB=',default_permissions,allow_other,default_permissions,al\x00\x00w_other,blk', @ANYRESDEC, @ANYBLOB="86a853615f673081a40f58bc33b90f77ab0cd764d5f5e6982c8fb9a05fe391acac32a0a410d4df150ff066143703e64d68c4d9de0ffc90a5251136930857c785465854e8ec4243b00524c33051da0818927da329f8f8ce3b4be88bbe76cfb33201a6d2059206d946cf51efe2428d2024900b1817ca171f", @ANYRESDEC=r5, @ANYBLOB=',smackfsroot=sha1-generic\x00,smackfshat=wlan0&vmnet0\')cpuset+']) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f00000001c0)={0x19980330, r0}, &(0x7f00000002c0)={0x0, 0x101, 0x8000000, 0x8, 0xe6}) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000003c0)=""/238) r8 = socket$inet(0x10, 0x3, 0x0) sendmsg(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)="4c0000001200ff09fffefd956fa283b7270fd917df226c24a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r8, &(0x7f0000001380), 0x4000056, 0x0, &(0x7f0000000200)={0x77359400}) syz_emit_ethernet(0x1, &(0x7f0000001640)=ANY=[@ANYRESDEC], 0x0) 07:12:10 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:12:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x538) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) pause() syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00R\x06\x96\xd4\x94\xb5\x98\xae\x90\xd7C\xfb\x87\xd9\xddk{\xa4\x10KyfEX\x85\x01\xe0\xf4\x04\x10w\xa4\'\xfd\x11\xbe\xed\x8c\x0fN\x8eiJ\xe6\rZ\xffC\x90~Gu\xe7\xb9(\x9a\x8a\xee\xc1\x8f\xd5\xb3\x88\'\xeb-W\x7f\xfd\x10p\n\xf2c\xe3\xf3\xe1\xb5\xc1\x8e^L\a1\xe1\x98\x00\x00\x00\x00\x00\x00') [ 1109.871324][ T26] audit: type=1800 audit(1574493130.510:2013): pid=21023 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16546 res=0 [ 1109.933553][ T26] audit: type=1800 audit(1574493130.540:2014): pid=21024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16578 res=0 [ 1109.970481][ T26] audit: type=1804 audit(1574493130.540:2015): pid=21024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/562/file0" dev="sda1" ino=16578 res=1 [ 1109.996398][ T26] audit: type=1804 audit(1574493130.550:2016): pid=21023 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/372/file0" dev="sda1" ino=16546 res=1 [ 1110.042305][T21033] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) [ 1110.053064][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.062573][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.074044][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.085065][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.096092][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.107105][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.118345][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.129403][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. 07:12:10 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1110.140266][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.151000][T21033] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1110.398215][ T26] audit: type=1800 audit(1574493131.030:2017): pid=21037 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16675 res=0 [ 1110.468406][ T26] audit: type=1804 audit(1574493131.090:2018): pid=21038 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/373/file0" dev="sda1" ino=16675 res=1 07:12:11 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1110.733120][ T26] audit: type=1800 audit(1574493131.370:2019): pid=21043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16675 res=0 [ 1110.786734][ T26] audit: type=1804 audit(1574493131.400:2020): pid=21043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/374/file0" dev="sda1" ino=16675 res=1 07:12:11 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa, 0x0, 0x0, 0x20}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) [ 1110.946253][ T26] audit: type=1800 audit(1574493131.580:2021): pid=21046 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16561 res=0 07:12:11 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1111.017054][ T26] audit: type=1804 audit(1574493131.610:2022): pid=21048 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/563/file0" dev="sda1" ino=16561 res=1 07:12:11 executing program 1: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0x0, 0x0) 07:12:11 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x100) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1112.560564][T21070] IPVS: ftp: loaded support on port[0] = 21 [ 1112.612777][T21070] chnl_net:caif_netlink_parms(): no params data found [ 1112.639051][T21070] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.646292][T21070] bridge0: port 1(bridge_slave_0) entered disabled state [ 1112.654252][T21070] device bridge_slave_0 entered promiscuous mode [ 1112.661886][T21070] bridge0: port 2(bridge_slave_1) entered blocking state [ 1112.669025][T21070] bridge0: port 2(bridge_slave_1) entered disabled state [ 1112.676670][T21070] device bridge_slave_1 entered promiscuous mode [ 1112.693612][T21070] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1112.704149][T21070] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1112.723047][T21070] team0: Port device team_slave_0 added [ 1112.730101][T21070] team0: Port device team_slave_1 added [ 1112.790871][T21070] device hsr_slave_0 entered promiscuous mode [ 1112.828874][T21070] device hsr_slave_1 entered promiscuous mode [ 1112.898422][T21070] debugfs: Directory 'hsr0' with parent '/' already present! [ 1112.912366][T21070] bridge0: port 2(bridge_slave_1) entered blocking state [ 1112.919589][T21070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1112.926962][T21070] bridge0: port 1(bridge_slave_0) entered blocking state [ 1112.934019][T21070] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1112.964640][T21070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1112.975811][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1112.983950][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1112.991921][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.000683][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1113.012963][T21070] 8021q: adding VLAN 0 to HW filter on device team0 [ 1113.023122][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1113.031968][T19914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1113.039035][T19914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1113.051209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1113.059846][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1113.066875][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1113.086214][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1113.094990][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1113.106644][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1113.120730][T21070] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1113.131384][T21070] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1113.143585][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1113.152019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1113.160540][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1113.177239][T21070] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1113.184699][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1113.192539][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1113.308947][T21079] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1114.318962][ T23] device bridge_slave_1 left promiscuous mode [ 1114.325213][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.379070][ T23] device bridge_slave_0 left promiscuous mode [ 1114.385316][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.108522][ T23] device hsr_slave_0 left promiscuous mode [ 1115.148403][ T23] device hsr_slave_1 left promiscuous mode [ 1115.214617][ T23] team0 (unregistering): Port device team_slave_1 removed [ 1115.224669][ T23] team0 (unregistering): Port device team_slave_0 removed [ 1115.234763][ T23] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1115.292245][ T23] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1115.348420][ T23] bond0 (unregistering): Released all slaves 07:12:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000100)={'bond0\x00\xe1\x03z\x01\x05!S\x17\x00', @ifru_names='bond_slave_1\x00\x00\x003'}) 07:12:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000fee000/0x12000)=nil, 0x800000, 0x1, 0x12, 0xffffffffffffffff, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e003d0) 07:12:25 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6", 0x100) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:25 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:25 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:12:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000000ce, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000100)={0x0, 0x2, 0x4, 0x2}) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r4, &(0x7f0000000140)=""/4096, 0x1000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() [ 1124.486536][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 1124.486569][ T26] audit: type=1800 audit(1574493145.120:2027): pid=21091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16593 res=0 [ 1124.567955][ T26] audit: type=1800 audit(1574493145.130:2028): pid=21090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16611 res=0 [ 1124.611205][ T26] audit: type=1804 audit(1574493145.170:2029): pid=21090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/377/file0" dev="sda1" ino=16611 res=1 07:12:25 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6", 0x100) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1124.638760][ T26] audit: type=1804 audit(1574493145.170:2030): pid=21091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/564/file0" dev="sda1" ino=16593 res=1 [ 1124.767777][ T26] audit: type=1800 audit(1574493145.400:2031): pid=21097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16578 res=0 [ 1124.819092][ T26] audit: type=1804 audit(1574493145.430:2032): pid=21097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/378/file0" dev="sda1" ino=16578 res=1 07:12:25 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x180) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1125.063063][ T26] audit: type=1800 audit(1574493145.700:2033): pid=21100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16578 res=0 [ 1125.118296][ T26] audit: type=1804 audit(1574493145.720:2034): pid=21100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/379/file0" dev="sda1" ino=16578 res=1 07:12:25 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x180) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:25 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1125.332243][ T26] audit: type=1800 audit(1574493145.970:2035): pid=21105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16578 res=0 07:12:26 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000780), 0x0, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) ptrace(0xffffffffffffffff, 0x0) [ 1125.415297][ T26] audit: type=1804 audit(1574493145.970:2036): pid=21105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/380/file0" dev="sda1" ino=16578 res=1 07:12:26 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x180) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1126.643577][T21123] IPVS: ftp: loaded support on port[0] = 21 [ 1126.693724][T21123] chnl_net:caif_netlink_parms(): no params data found [ 1126.719252][T21123] bridge0: port 1(bridge_slave_0) entered blocking state [ 1126.726301][T21123] bridge0: port 1(bridge_slave_0) entered disabled state [ 1126.734182][T21123] device bridge_slave_0 entered promiscuous mode [ 1126.741547][T21123] bridge0: port 2(bridge_slave_1) entered blocking state [ 1126.748643][T21123] bridge0: port 2(bridge_slave_1) entered disabled state [ 1126.756547][T21123] device bridge_slave_1 entered promiscuous mode [ 1126.772969][T21123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1126.783628][T21123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1126.801849][T21123] team0: Port device team_slave_0 added [ 1126.808588][T21123] team0: Port device team_slave_1 added [ 1126.890662][T21123] device hsr_slave_0 entered promiscuous mode [ 1126.928777][T21123] device hsr_slave_1 entered promiscuous mode [ 1126.978336][T21123] debugfs: Directory 'hsr0' with parent '/' already present! [ 1126.992609][T21123] bridge0: port 2(bridge_slave_1) entered blocking state [ 1126.999648][T21123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1127.007144][T21123] bridge0: port 1(bridge_slave_0) entered blocking state [ 1127.014171][T21123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1127.042986][T21123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1127.053972][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1127.062266][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1127.070176][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1127.081416][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1127.093057][T21123] 8021q: adding VLAN 0 to HW filter on device team0 [ 1127.103568][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1127.112173][T19914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1127.119471][T19914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1127.139993][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1127.148865][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1127.155922][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1127.164843][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1127.174080][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1127.184437][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1127.192604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1127.204573][T21123] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1127.216066][T21123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1127.224365][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1127.238588][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1127.245972][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1127.256689][T21123] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1127.377231][T21133] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1128.408762][ T7670] device bridge_slave_1 left promiscuous mode [ 1128.415004][ T7670] bridge0: port 2(bridge_slave_1) entered disabled state [ 1128.468989][ T7670] device bridge_slave_0 left promiscuous mode [ 1128.475317][ T7670] bridge0: port 1(bridge_slave_0) entered disabled state [ 1129.188503][ T7670] device hsr_slave_0 left promiscuous mode [ 1129.238378][ T7670] device hsr_slave_1 left promiscuous mode [ 1129.285199][ T7670] team0 (unregistering): Port device team_slave_1 removed [ 1129.295534][ T7670] team0 (unregistering): Port device team_slave_0 removed [ 1129.305872][ T7670] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1129.352112][ T7670] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1129.408154][ T7670] bond0 (unregistering): Released all slaves [ 1136.901902][T21139] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:12:39 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) pipe2$9p(0x0, 0x0) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB="e4677e4f6db66ede6cc4b7730203bcf2ef29b1ffd2c040ed35baa2986deabde470e06686ff5c443b868349349c6d4e76b4408084aa839f2dd4f06be1f684170c47dc45f9c15a98b3893da0075588117889af154bcfc1723e8d98f09b1f411a029811a4d6c0e4322f9109676f3717cc31a4553bf710ab9f2416006a168817b43b1a1b727b74da3b27c69fe88bc829f5824eafc70e9f5fef22651b3040229acee39441bdfbe8a3cd333c2e93c6e6b6dfc806447bacee51e158d92baeb8249b27d0a115ffc568a6e8bac9ee"], 0xca) r1 = syz_open_dev$vcsn(0x0, 0xfff, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000200), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000140)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000300)) 07:12:39 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000780), 0x0, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) ptrace(0xffffffffffffffff, 0x0) 07:12:39 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1c0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:39 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) creat(0x0, 0x0) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:12:39 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000780), 0x0, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) ptrace(0xffffffffffffffff, 0x0) [ 1139.047611][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 1139.047647][ T26] audit: type=1800 audit(1574493159.680:2043): pid=21145 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16663 res=0 [ 1139.124477][ T26] audit: type=1804 audit(1574493159.720:2045): pid=21145 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/382/file0" dev="sda1" ino=16663 res=1 [ 1139.216583][ T26] audit: type=1800 audit(1574493159.720:2044): pid=21147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16520 res=0 07:12:39 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1c0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1139.264562][ T26] audit: type=1804 audit(1574493159.720:2046): pid=21147 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/566/file0" dev="sda1" ino=16520 res=1 07:12:40 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000780), 0x0, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) ptrace(0xffffffffffffffff, 0x0) [ 1139.348293][ T26] audit: type=1804 audit(1574493159.820:2047): pid=21146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir253811555/syzkaller.KDWU6Q/769/bus" dev="sda1" ino=16643 res=1 [ 1139.453830][ T26] audit: type=1800 audit(1574493160.040:2048): pid=21151 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16611 res=0 [ 1139.559255][ T26] audit: type=1804 audit(1574493160.040:2049): pid=21151 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/383/file0" dev="sda1" ino=16611 res=1 07:12:40 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1c0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1139.715535][ T26] audit: type=1804 audit(1574493160.350:2050): pid=21154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir253811555/syzkaller.KDWU6Q/770/bus" dev="sda1" ino=16675 res=1 [ 1139.793062][ T26] audit: type=1800 audit(1574493160.380:2051): pid=21156 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16628 res=0 07:12:40 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000780), 0x0, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) ptrace(0xffffffffffffffff, 0x0) [ 1139.845052][ T26] audit: type=1804 audit(1574493160.390:2052): pid=21156 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/384/file0" dev="sda1" ino=16628 res=1 07:12:40 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e6", 0x1e0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:40 executing program 3: ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1141.386550][T21172] IPVS: ftp: loaded support on port[0] = 21 [ 1141.437431][T21172] chnl_net:caif_netlink_parms(): no params data found [ 1141.463322][T21172] bridge0: port 1(bridge_slave_0) entered blocking state [ 1141.470479][T21172] bridge0: port 1(bridge_slave_0) entered disabled state [ 1141.478074][T21172] device bridge_slave_0 entered promiscuous mode [ 1141.485606][T21172] bridge0: port 2(bridge_slave_1) entered blocking state [ 1141.492684][T21172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1141.502545][T21172] device bridge_slave_1 entered promiscuous mode [ 1141.518227][T21172] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1141.529133][T21172] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1141.547601][T21172] team0: Port device team_slave_0 added [ 1141.554451][T21172] team0: Port device team_slave_1 added [ 1141.630836][T21172] device hsr_slave_0 entered promiscuous mode [ 1141.688831][T21172] device hsr_slave_1 entered promiscuous mode [ 1141.748344][T21172] debugfs: Directory 'hsr0' with parent '/' already present! [ 1141.762444][T21172] bridge0: port 2(bridge_slave_1) entered blocking state [ 1141.769557][T21172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1141.776809][T21172] bridge0: port 1(bridge_slave_0) entered blocking state [ 1141.783847][T21172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1141.812201][T21172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1141.822993][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1141.831546][ T7869] bridge0: port 1(bridge_slave_0) entered disabled state [ 1141.839395][ T7869] bridge0: port 2(bridge_slave_1) entered disabled state [ 1141.848026][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1141.859617][T21172] 8021q: adding VLAN 0 to HW filter on device team0 [ 1141.869753][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1141.878126][T19914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1141.885195][T19914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1141.900471][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1141.909014][ T7869] bridge0: port 2(bridge_slave_1) entered blocking state [ 1141.916021][ T7869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1141.934348][T21172] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1141.944918][T21172] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1141.957654][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1141.966592][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1141.975353][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1141.983725][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1141.992085][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1141.999825][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1142.016772][T21172] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1142.024208][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1142.031909][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1142.148115][T21181] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1143.208878][ T7670] device bridge_slave_1 left promiscuous mode [ 1143.215154][ T7670] bridge0: port 2(bridge_slave_1) entered disabled state [ 1143.259270][ T7670] device bridge_slave_0 left promiscuous mode [ 1143.265545][ T7670] bridge0: port 1(bridge_slave_0) entered disabled state [ 1143.941298][ T7670] device hsr_slave_0 left promiscuous mode [ 1143.978315][ T7670] device hsr_slave_1 left promiscuous mode [ 1144.024785][ T7670] team0 (unregistering): Port device team_slave_1 removed [ 1144.035463][ T7670] team0 (unregistering): Port device team_slave_0 removed [ 1144.045446][ T7670] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1144.091625][ T7670] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1144.149245][ T7670] bond0 (unregistering): Released all slaves 07:12:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000140)=""/205, 0xcd}], 0x1}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r3, 0xffff, 0x1006, &(0x7f0000000000)={0x0, 0x10000}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r3, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r2, 0x0) shutdown(r3, 0x0) 07:12:55 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1e0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:55 executing program 3: ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:55 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5687a64820546a1ebed56adb3b91e7f1ffd5e4ab56ad8e39808e0b61a0bf7a301ffe8dac0726906da58a5d1ab066f24351eda628769d37cbcb5c0c5d6b03e4c0487a0c5c", @ANYRESOCT, @ANYRESOCT, @ANYPTR, @ANYRESHEX, @ANYBLOB="e6c5ebf5c5932eec510100019b3d7280437a7462010000000000000029a741efca449d56d0492482ba8340575400402cc43b3897ccb5430331f633e7ec2bc40d42cc3aa39f2441d8ece5ff1b9d9e2afb67446200010000a7b1344f1da296cfc94ae59817a5151900000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d07be301e5566b4d1447a932f0b0b061ef000"/193, @ANYRESHEX], 0x0, 0x174}, 0x20) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 07:12:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) creat(0x0, 0x0) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:12:55 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000780), 0x0, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) ptrace(0xffffffffffffffff, 0x0) [ 1154.572096][ T26] kauditd_printk_skb: 5 callbacks suppressed [ 1154.572168][ T26] audit: type=1800 audit(1574493175.210:2058): pid=21194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16611 res=0 [ 1154.591262][T21196] ptrace attach of "/root/syz-executor.1"[21195] was attempted by "/root/syz-executor.1"[21196] 07:12:55 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x25a, &(0x7f0000000980), 0x100000000000002f, 0x0, 0xfffffffffffffd21, 0x20000001}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'hsr0\x00', 0x103}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xfffffd21) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0xc) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) gettid() getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) [ 1154.677415][ T26] audit: type=1804 audit(1574493175.250:2059): pid=21194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/568/file0" dev="sda1" ino=16611 res=1 07:12:55 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1e0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1154.770751][ T26] audit: type=1800 audit(1574493175.250:2060): pid=21197 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16532 res=0 [ 1154.854406][ T26] audit: type=1804 audit(1574493175.270:2061): pid=21193 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/386/file0" dev="sda1" ino=16532 res=1 [ 1154.927861][ T26] audit: type=1800 audit(1574493175.520:2062): pid=21208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16593 res=0 07:12:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x538) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000440)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(r3, 0x0, 0x5f0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_script(r4, 0x0, 0x5f0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000280)) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000340)={0x14, 0x49, 0x2, {0x40, 0x0, 0x7}}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001400)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001500)=0xe8) setsockopt$packet_drop_memb(r5, 0x107, 0x2, &(0x7f0000001540)={r6, 0x1, 0x6, @broadcast}, 0x10) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001400)={{{@in6=@remote, @in=@initdev}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001500)=0xe8) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001540)={0x0, 0x1, 0x6, @broadcast}, 0x10) r7 = creat(&(0x7f0000000080)='./file1\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$tun(r7, 0x0, 0x0) [ 1154.975467][ T26] audit: type=1804 audit(1574493175.530:2063): pid=21208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/387/file0" dev="sda1" ino=16593 res=1 07:12:55 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:12:55 executing program 1: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x11, 0x0, 0x300) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x78, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee405dc08000000000000000000000000639a03242189c609000000", 0x23}], 0x1}, 0x20004) [ 1155.244107][ T26] audit: type=1800 audit(1574493175.880:2064): pid=21216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16578 res=0 [ 1155.298687][ T26] audit: type=1804 audit(1574493175.880:2065): pid=21216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/388/file0" dev="sda1" ino=16578 res=1 07:12:56 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1155.395922][T21220] __nla_validate_parse: 179 callbacks suppressed [ 1155.395932][T21220] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.1'. 07:12:56 executing program 3: ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1155.462590][T21222] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1155.492198][ T26] audit: type=1800 audit(1574493176.130:2066): pid=21224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16578 res=0 [ 1155.531828][ T26] audit: type=1804 audit(1574493176.160:2067): pid=21224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/389/file0" dev="sda1" ino=16578 res=1 [ 1156.957680][T21234] IPVS: ftp: loaded support on port[0] = 21 [ 1157.007059][T21234] chnl_net:caif_netlink_parms(): no params data found [ 1157.032926][T21234] bridge0: port 1(bridge_slave_0) entered blocking state [ 1157.040044][T21234] bridge0: port 1(bridge_slave_0) entered disabled state [ 1157.047498][T21234] device bridge_slave_0 entered promiscuous mode [ 1157.054912][T21234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1157.062046][T21234] bridge0: port 2(bridge_slave_1) entered disabled state [ 1157.069860][T21234] device bridge_slave_1 entered promiscuous mode [ 1157.086349][T21234] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1157.096859][T21234] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1157.114205][T21234] team0: Port device team_slave_0 added [ 1157.121096][T21234] team0: Port device team_slave_1 added [ 1157.200194][T21234] device hsr_slave_0 entered promiscuous mode [ 1157.258593][T21234] device hsr_slave_1 entered promiscuous mode [ 1157.308315][T21234] debugfs: Directory 'hsr0' with parent '/' already present! [ 1157.321666][T21234] bridge0: port 2(bridge_slave_1) entered blocking state [ 1157.328752][T21234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1157.335987][T21234] bridge0: port 1(bridge_slave_0) entered blocking state [ 1157.343022][T21234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1157.371398][T21234] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1157.383270][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1157.391676][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1157.399624][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1157.408197][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1157.419313][T21234] 8021q: adding VLAN 0 to HW filter on device team0 [ 1157.429154][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1157.437497][T20467] bridge0: port 1(bridge_slave_0) entered blocking state [ 1157.444600][T20467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1157.458986][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1157.467424][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1157.474619][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1157.486715][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1157.495478][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1157.506034][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1157.520180][T21234] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1157.530888][T21234] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1157.542860][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1157.551703][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1157.560437][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1157.576589][T21234] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1157.584684][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1157.592468][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1157.717208][T21244] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1158.688936][ T8002] device bridge_slave_1 left promiscuous mode [ 1158.695194][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 1158.752109][ T8002] device bridge_slave_0 left promiscuous mode [ 1158.758705][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 1159.458646][ T8002] device hsr_slave_0 left promiscuous mode [ 1159.528309][ T8002] device hsr_slave_1 left promiscuous mode [ 1159.604473][ T8002] team0 (unregistering): Port device team_slave_1 removed [ 1159.614719][ T8002] team0 (unregistering): Port device team_slave_0 removed [ 1159.625119][ T8002] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1159.681890][ T8002] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1159.747516][ T8002] bond0 (unregistering): Released all slaves 07:13:06 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000308004f7b419a6a00000000009078ac1414aa7f000001070290780000f400"/54], 0x0) 07:13:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x5000, 0x0, 0x0, 0xd0d7, 0x0, [{}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x80}, {}, {0x0, 0x2, 0x0, [], 0xfffffffeffffffff}, {}, {0x0, 0x0, 0x0, [], 0xfe}]}}) 07:13:06 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1", 0x1f0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:06 executing program 3: creat(0x0, 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) creat(0x0, 0x0) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:13:06 executing program 2: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000006c0)='trusted\x00', 0x0, &(0x7f0000000780), 0x0, 0x0) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) ptrace(0xffffffffffffffff, 0x0) [ 1166.011919][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 1166.011935][ T26] audit: type=1800 audit(1574493186.650:2070): pid=21255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16690 res=0 [ 1166.078532][ T26] audit: type=1804 audit(1574493186.650:2071): pid=21255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/570/file0" dev="sda1" ino=16690 res=1 [ 1166.168291][ T26] audit: type=1800 audit(1574493186.690:2072): pid=21254 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16709 res=0 07:13:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x5000, 0x0, 0x0, 0xd0d7, 0x0, [{}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x80}, {}, {0x0, 0x2, 0x0, [], 0xfffffffeffffffff}, {}, {0x0, 0x0, 0x0, [], 0xfe}]}}) 07:13:06 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f8) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1166.257304][ T26] audit: type=1804 audit(1574493186.700:2073): pid=21254 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/390/file0" dev="sda1" ino=16709 res=1 [ 1166.406456][ T26] audit: type=1800 audit(1574493187.040:2074): pid=21265 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16745 res=0 [ 1166.448341][ T26] audit: type=1804 audit(1574493187.070:2075): pid=21265 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/391/file0" dev="sda1" ino=16745 res=1 07:13:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x5000, 0x0, 0x0, 0xd0d7, 0x0, [{}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x80}, {}, {0x0, 0x2, 0x0, [], 0xfffffffeffffffff}, {}, {0x0, 0x0, 0x0, [], 0xfe}]}}) 07:13:07 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f8) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1166.782511][ T26] audit: type=1800 audit(1574493187.420:2076): pid=21275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16745 res=0 07:13:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x5000, 0x0, 0x0, 0xd0d7, 0x0, [{}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x80}, {}, {0x0, 0x2, 0x0, [], 0xfffffffeffffffff}, {}, {0x0, 0x0, 0x0, [], 0xfe}]}}) [ 1166.815628][ T26] audit: type=1804 audit(1574493187.420:2077): pid=21275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/392/file0" dev="sda1" ino=16745 res=1 07:13:07 executing program 3: creat(0x0, 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1166.992033][ T26] audit: type=1800 audit(1574493187.630:2078): pid=21283 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16690 res=0 [ 1167.084709][ T26] audit: type=1804 audit(1574493187.670:2079): pid=21283 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/571/file0" dev="sda1" ino=16690 res=1 [ 1168.346757][T21290] IPVS: ftp: loaded support on port[0] = 21 [ 1168.397430][T21290] chnl_net:caif_netlink_parms(): no params data found [ 1168.423212][T21290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.430322][T21290] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.438369][T21290] device bridge_slave_0 entered promiscuous mode [ 1168.445787][T21290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.453188][T21290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.461095][T21290] device bridge_slave_1 entered promiscuous mode [ 1168.478206][T21290] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1168.489228][T21290] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1168.507428][T21290] team0: Port device team_slave_0 added [ 1168.514229][T21290] team0: Port device team_slave_1 added [ 1168.580680][T21290] device hsr_slave_0 entered promiscuous mode [ 1168.618617][T21290] device hsr_slave_1 entered promiscuous mode [ 1168.658370][T21290] debugfs: Directory 'hsr0' with parent '/' already present! [ 1168.672366][T21290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.679438][T21290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1168.686740][T21290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.693773][T21290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1168.720847][T21290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1168.732132][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1168.740308][T19395] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.747948][T19395] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.756843][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1168.768179][T21290] 8021q: adding VLAN 0 to HW filter on device team0 [ 1168.778504][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1168.786773][ T7647] bridge0: port 1(bridge_slave_0) entered blocking state [ 1168.793868][ T7647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1168.804100][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1168.814991][T19395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1168.822028][T19395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1168.839072][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1168.847976][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1168.858664][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1168.872615][T21290] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1168.883199][T21290] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1168.895225][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1168.904129][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1168.912588][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1168.928924][T21290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1168.936495][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1168.944493][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1169.077495][T21300] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1170.180727][ T7670] device bridge_slave_1 left promiscuous mode [ 1170.186995][ T7670] bridge0: port 2(bridge_slave_1) entered disabled state [ 1170.229165][ T7670] device bridge_slave_0 left promiscuous mode [ 1170.235430][ T7670] bridge0: port 1(bridge_slave_0) entered disabled state [ 1170.948683][ T7670] device hsr_slave_0 left promiscuous mode [ 1170.998465][ T7670] device hsr_slave_1 left promiscuous mode [ 1171.073934][ T7670] team0 (unregistering): Port device team_slave_1 removed [ 1171.084111][ T7670] team0 (unregistering): Port device team_slave_0 removed [ 1171.094298][ T7670] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1171.152036][ T7670] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1171.218609][ T7670] bond0 (unregistering): Released all slaves 07:13:20 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002580)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}, 0x0) r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x300, 0x4}, 0x80, &(0x7f0000000140)=[{&(0x7f0000003600)="84840e00fb2b08233e496d5671dc71ff04291b2c1501772502bb867063f72f47862a15257781bcf1d1e498104d082833914ee68afc14ac7cb85975751b8c3127", 0x40}], 0x300, 0x0, 0x0, 0x1a0}, 0x0) 07:13:20 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f8) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x5000, 0x0, 0x0, 0xd0d7, 0x0, [{}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x80}, {}, {0x0, 0x2, 0x0, [], 0xfffffffeffffffff}, {}, {0x0, 0x0, 0x0, [], 0xfe}]}}) 07:13:20 executing program 3: creat(0x0, 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:20 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1179.421120][ T26] audit: type=1800 audit(1574493200.060:2080): pid=21306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16520 res=0 [ 1179.452791][ T26] audit: type=1804 audit(1574493200.080:2081): pid=21306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/393/file0" dev="sda1" ino=16520 res=1 [ 1179.482342][ T26] audit: type=1800 audit(1574493200.080:2082): pid=21309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16532 res=0 [ 1179.519207][ T26] audit: type=1804 audit(1574493200.090:2083): pid=21309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/572/file0" dev="sda1" ino=16532 res=1 07:13:21 executing program 2: r0 = socket$inet6(0x10, 0x80000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)="5500000018007f7000fe01b2a4a280930a600000ffa84302910000003900050035000c00030000000e000500fc637400e34f040a1a3ad5570800c78b80082314e9030b9d110085b1766732009b84e7b1df136ef75a", 0x55}], 0x1}, 0x0) 07:13:21 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fc) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x5000, 0x0, 0x0, 0xd0d7, 0x0, [{}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x80}, {}, {0x0, 0x2, 0x0, [], 0xfffffffeffffffff}, {}, {0x0, 0x0, 0x0, [], 0xfe}]}}) 07:13:21 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1181.317206][ T26] audit: type=1800 audit(1574493201.950:2084): pid=21324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16626 res=0 [ 1181.346611][ T26] audit: type=1804 audit(1574493201.960:2085): pid=21324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/394/file0" dev="sda1" ino=16626 res=1 [ 1181.398593][ T26] audit: type=1800 audit(1574493202.020:2086): pid=21325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16753 res=0 [ 1181.415514][T21327] IPVS: ftp: loaded support on port[0] = 21 07:13:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x5000, 0x0, 0x0, 0xd0d7, 0x0, [{}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x80}, {}, {0x0, 0x2, 0x0, [], 0xfffffffeffffffff}, {}, {0x0, 0x0, 0x0, [], 0xfe}]}}) [ 1181.445339][ T26] audit: type=1804 audit(1574493202.040:2087): pid=21325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/573/file0" dev="sda1" ino=16753 res=1 07:13:22 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fc) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1181.540682][T21327] chnl_net:caif_netlink_parms(): no params data found [ 1181.577609][T21327] bridge0: port 1(bridge_slave_0) entered blocking state [ 1181.625461][T21327] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.661418][T21327] device bridge_slave_0 entered promiscuous mode 07:13:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001e40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000280)="267747da60c4615699b76b865e566616a4", 0x11}], 0x1}}], 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x2d2) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1181.689032][T21327] bridge0: port 2(bridge_slave_1) entered blocking state [ 1181.706163][T21327] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.713336][ T26] audit: type=1800 audit(1574493202.350:2088): pid=21337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16721 res=0 [ 1181.736331][T21327] device bridge_slave_1 entered promiscuous mode [ 1181.760154][ T26] audit: type=1804 audit(1574493202.370:2089): pid=21337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/395/file0" dev="sda1" ino=16721 res=1 [ 1181.774813][T21327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1181.803903][T21327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1181.831213][T21327] team0: Port device team_slave_0 added [ 1181.838890][T21327] team0: Port device team_slave_1 added [ 1181.900799][T21327] device hsr_slave_0 entered promiscuous mode [ 1181.938803][T21327] device hsr_slave_1 entered promiscuous mode [ 1181.998347][T21327] debugfs: Directory 'hsr0' with parent '/' already present! [ 1182.022665][T21327] bridge0: port 2(bridge_slave_1) entered blocking state [ 1182.029819][T21327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1182.037188][T21327] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.044263][T21327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1182.078497][T21327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1182.091001][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1182.099841][ T7869] bridge0: port 1(bridge_slave_0) entered disabled state [ 1182.107967][ T7869] bridge0: port 2(bridge_slave_1) entered disabled state [ 1182.120079][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1182.135235][T21327] 8021q: adding VLAN 0 to HW filter on device team0 [ 1182.147256][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1182.155989][ T7869] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.163046][ T7869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1182.181064][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1182.189684][ T7647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1182.196716][ T7647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1182.219675][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1182.231601][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1182.240596][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1182.252447][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1182.261837][T21327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1182.272992][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1182.288629][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1182.296052][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1182.307270][T21327] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1182.463778][T21356] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1183.509152][T19966] device bridge_slave_1 left promiscuous mode [ 1183.515426][T19966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1183.569147][T19966] device bridge_slave_0 left promiscuous mode [ 1183.575324][T19966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1184.228498][T19966] device hsr_slave_0 left promiscuous mode [ 1184.278457][T19966] device hsr_slave_1 left promiscuous mode [ 1184.334615][T19966] team0 (unregistering): Port device team_slave_1 removed [ 1184.345083][T19966] team0 (unregistering): Port device team_slave_0 removed [ 1184.355180][T19966] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1184.392480][T19966] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1184.468694][T19966] bond0 (unregistering): Released all slaves 07:13:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x0) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/101) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0xff00) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xfffffffffffffffc, 0x5, 0x0, 0x0, 0x8880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0xa, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, 0x0, &(0x7f0000000480)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000006c0)=ANY=[], 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000540)=0x1) socket$inet6(0xa, 0x0, 0x7) 07:13:31 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fc) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:31 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:31 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RLOPEN(r1, &(0x7f0000000640)={0x18, 0xd, 0x1, {{0x0, 0x1, 0x4}, 0x6}}, 0x18) r7 = socket(0x10, 0x80002, 0x0) connect$netlink(r7, &(0x7f0000e8f000)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r8, 0x0, 0x8000fffffffe) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) 07:13:31 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1190.743848][ T26] audit: type=1800 audit(1574493211.380:2090): pid=21364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16626 res=0 [ 1190.791335][ T26] audit: type=1804 audit(1574493211.380:2091): pid=21364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/396/file0" dev="sda1" ino=16626 res=1 [ 1190.842571][ T26] audit: type=1800 audit(1574493211.430:2092): pid=21367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16708 res=0 [ 1190.929018][ T26] audit: type=1804 audit(1574493211.430:2093): pid=21367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/574/file0" dev="sda1" ino=16708 res=1 [ 1191.032137][ T26] audit: type=1804 audit(1574493211.480:2094): pid=21365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir253811555/syzkaller.KDWU6Q/784/bus" dev="sda1" ino=16658 res=1 [ 1192.826191][T21375] IPVS: ftp: loaded support on port[0] = 21 [ 1192.875664][T21375] chnl_net:caif_netlink_parms(): no params data found [ 1192.902041][T21375] bridge0: port 1(bridge_slave_0) entered blocking state [ 1192.909165][T21375] bridge0: port 1(bridge_slave_0) entered disabled state [ 1192.916765][T21375] device bridge_slave_0 entered promiscuous mode [ 1192.924338][T21375] bridge0: port 2(bridge_slave_1) entered blocking state [ 1192.931412][T21375] bridge0: port 2(bridge_slave_1) entered disabled state [ 1192.939415][T21375] device bridge_slave_1 entered promiscuous mode [ 1192.955875][T21375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1192.966347][T21375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1192.984201][T21375] team0: Port device team_slave_0 added [ 1192.991226][T21375] team0: Port device team_slave_1 added [ 1193.060724][T21375] device hsr_slave_0 entered promiscuous mode [ 1193.128692][T21375] device hsr_slave_1 entered promiscuous mode [ 1193.188311][T21375] debugfs: Directory 'hsr0' with parent '/' already present! [ 1193.202547][T21375] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.209642][T21375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.216915][T21375] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.223951][T21375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1193.252338][T21375] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1193.263394][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1193.271804][T19395] bridge0: port 1(bridge_slave_0) entered disabled state [ 1193.279813][T19395] bridge0: port 2(bridge_slave_1) entered disabled state [ 1193.289297][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1193.300836][T21375] 8021q: adding VLAN 0 to HW filter on device team0 [ 1193.311016][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1193.319686][ T7647] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.326714][ T7647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1193.339751][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1193.348113][T19395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.355151][T19395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.371398][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1193.380347][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1193.394291][T21375] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1193.405302][T21375] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1193.417473][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1193.425827][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1193.434579][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1193.442939][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1193.459156][T21375] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1193.466563][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1193.474542][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1193.601031][T21385] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1194.739409][T19966] device bridge_slave_1 left promiscuous mode [ 1194.745603][T19966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1194.788925][T19966] device bridge_slave_0 left promiscuous mode [ 1194.795139][T19966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1195.468650][T19966] device hsr_slave_0 left promiscuous mode [ 1195.538431][T19966] device hsr_slave_1 left promiscuous mode [ 1195.584085][T19966] team0 (unregistering): Port device team_slave_1 removed [ 1195.594968][T19966] team0 (unregistering): Port device team_slave_0 removed [ 1195.604911][T19966] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1195.662284][T19966] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1195.738631][T19966] bond0 (unregistering): Released all slaves 07:13:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x2901}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)}, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 07:13:36 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fe) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:36 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x2, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RLOPEN(r1, &(0x7f0000000640)={0x18, 0xd, 0x1, {{0x0, 0x1, 0x4}, 0x6}}, 0x18) r7 = socket(0x10, 0x80002, 0x0) connect$netlink(r7, &(0x7f0000e8f000)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r8, 0x0, 0x8000fffffffe) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) 07:13:36 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:36 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) syz_genetlink_get_family_id$nbd(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1195.949148][ T26] audit: type=1800 audit(1574493216.590:2095): pid=21389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16762 res=0 [ 1196.050841][ T26] audit: type=1800 audit(1574493216.590:2096): pid=21393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16761 res=0 07:13:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/88, 0x58) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000280)=""/11, 0xb) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_buf(r3, 0x29, 0x2d, &(0x7f0000000100)="9f35ce1c34ccc2f39450cecb676dce7796c61ccbbdd29b9d01e0cf47987776750df8c1af39f3859f849df11b709b77d03a3675975af0afb53b8199594d81378bc74a8f976c923585f4bd96aa40e09147504761075e550927b6a158392fb555d605c63c57f7703922d985d2fa26208e824eb39df4c449c7f7d40ca3f7d07599ff88a7b6073fada60e", 0x88) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast2}, {}, 0x0, {}, 'netpci0\x00'}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000002c0)) [ 1196.124815][ T26] audit: type=1804 audit(1574493216.620:2097): pid=21389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/397/file0" dev="sda1" ino=16762 res=1 07:13:36 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fe) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1196.234103][ T26] audit: type=1804 audit(1574493216.620:2098): pid=21393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/575/file0" dev="sda1" ino=16761 res=1 [ 1196.393075][ T26] audit: type=1804 audit(1574493216.670:2099): pid=21391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir253811555/syzkaller.KDWU6Q/785/bus" dev="sda1" ino=16709 res=1 [ 1196.419762][ T26] audit: type=1800 audit(1574493216.980:2100): pid=21399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16613 res=0 [ 1196.458865][ T26] audit: type=1804 audit(1574493216.990:2101): pid=21399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/398/file0" dev="sda1" ino=16613 res=1 [ 1198.173721][T21414] IPVS: ftp: loaded support on port[0] = 21 [ 1198.223243][T21414] chnl_net:caif_netlink_parms(): no params data found [ 1198.249937][T21414] bridge0: port 1(bridge_slave_0) entered blocking state [ 1198.257042][T21414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1198.264902][T21414] device bridge_slave_0 entered promiscuous mode [ 1198.272221][T21414] bridge0: port 2(bridge_slave_1) entered blocking state [ 1198.279330][T21414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1198.287015][T21414] device bridge_slave_1 entered promiscuous mode [ 1198.304385][T21414] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1198.314815][T21414] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1198.332815][T21414] team0: Port device team_slave_0 added [ 1198.340082][T21414] team0: Port device team_slave_1 added [ 1198.410971][T21414] device hsr_slave_0 entered promiscuous mode [ 1198.448772][T21414] device hsr_slave_1 entered promiscuous mode [ 1198.498321][T21414] debugfs: Directory 'hsr0' with parent '/' already present! [ 1198.512931][T21414] bridge0: port 2(bridge_slave_1) entered blocking state [ 1198.519979][T21414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1198.527189][T21414] bridge0: port 1(bridge_slave_0) entered blocking state [ 1198.534220][T21414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1198.562405][T21414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1198.573600][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1198.582108][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1198.590393][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1198.599172][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1198.611569][T21414] 8021q: adding VLAN 0 to HW filter on device team0 [ 1198.622094][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1198.630523][ T7647] bridge0: port 1(bridge_slave_0) entered blocking state [ 1198.637543][ T7647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1198.647998][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1198.656528][T20467] bridge0: port 2(bridge_slave_1) entered blocking state [ 1198.663740][T20467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1198.681927][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1198.690844][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1198.699589][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1198.710989][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1198.722576][T21414] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1198.733766][T21414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1198.741919][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1198.759351][T21414] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1198.767319][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1198.775387][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1198.897312][T21424] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1199.969136][ T8002] device bridge_slave_1 left promiscuous mode [ 1199.975345][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 1200.038843][ T8002] device bridge_slave_0 left promiscuous mode [ 1200.045226][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 1200.738479][ T8002] device hsr_slave_0 left promiscuous mode [ 1200.788337][ T8002] device hsr_slave_1 left promiscuous mode [ 1200.874329][ T8002] team0 (unregistering): Port device team_slave_1 removed [ 1200.884709][ T8002] team0 (unregistering): Port device team_slave_0 removed [ 1200.894822][ T8002] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1200.931904][ T8002] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1201.008618][ T8002] bond0 (unregistering): Released all slaves 07:13:46 executing program 5: clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x366, 0x4) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x9ba5}], 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x2000) 07:13:46 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:46 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) write(r2, 0x0, 0x0) 07:13:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1205.513914][ T26] audit: type=1800 audit(1574493226.150:2102): pid=21439 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16765 res=0 [ 1205.568360][ T26] audit: type=1800 audit(1574493226.160:2103): pid=21443 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16764 res=0 [ 1205.615011][ T26] audit: type=1804 audit(1574493226.160:2104): pid=21443 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/399/file0" dev="sda1" ino=16764 res=1 [ 1205.688349][ T26] audit: type=1804 audit(1574493226.180:2105): pid=21439 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/576/file0" dev="sda1" ino=16765 res=1 [ 1205.726491][ T26] audit: type=1800 audit(1574493226.190:2106): pid=21442 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16520 res=0 [ 1207.250866][T21450] IPVS: ftp: loaded support on port[0] = 21 [ 1207.300021][T21450] chnl_net:caif_netlink_parms(): no params data found [ 1207.326426][T21450] bridge0: port 1(bridge_slave_0) entered blocking state [ 1207.333643][T21450] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.341503][T21450] device bridge_slave_0 entered promiscuous mode [ 1207.349151][T21450] bridge0: port 2(bridge_slave_1) entered blocking state [ 1207.356336][T21450] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.364277][T21450] device bridge_slave_1 entered promiscuous mode [ 1207.382352][T21450] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1207.393079][T21450] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1207.411206][T21450] team0: Port device team_slave_0 added [ 1207.418107][T21450] team0: Port device team_slave_1 added [ 1207.470859][T21450] device hsr_slave_0 entered promiscuous mode [ 1207.508654][T21450] device hsr_slave_1 entered promiscuous mode [ 1207.558279][T21450] debugfs: Directory 'hsr0' with parent '/' already present! [ 1207.576278][T21450] bridge0: port 2(bridge_slave_1) entered blocking state [ 1207.583344][T21450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1207.590759][T21450] bridge0: port 1(bridge_slave_0) entered blocking state [ 1207.597805][T21450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1207.627149][T21450] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1207.638069][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1207.646509][ T7869] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.654565][ T7869] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.663930][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1207.675465][T21450] 8021q: adding VLAN 0 to HW filter on device team0 [ 1207.686508][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1207.694897][T20467] bridge0: port 1(bridge_slave_0) entered blocking state [ 1207.701926][T20467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1207.712539][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1207.721105][ T7647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1207.728125][ T7647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1207.749383][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1207.758055][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1207.767179][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1207.775782][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1207.786632][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1207.796593][T21450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1207.810448][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1207.817882][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1207.828180][T21450] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1207.969990][T21460] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1208.918970][ T7755] device bridge_slave_1 left promiscuous mode [ 1208.925249][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1208.969209][ T7755] device bridge_slave_0 left promiscuous mode [ 1208.975476][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state 07:13:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) pipe2(&(0x7f00000000c0), 0x8400) syz_open_procfs(0x0, &(0x7f0000000100)='attr/sockcreate\x00') mkdir(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x4) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101000, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto(r4, &(0x7f0000000400)="810a6f3abc99137d425d82ee3544931f4b06a02b587c023b314b4a7479c0dfb9b79bab7628bb8186e5f9a00d75291a652e7cacca158b9c173defa0f43aee724f112e984df5d0e25f2c2ab5da65289fa1264d6712b7f8fa39d0f790748026e047c66f19", 0x63, 0x4004000, &(0x7f0000000480)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80) 07:13:50 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1ff) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:50 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:13:50 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1209.413612][ T26] audit: type=1800 audit(1574493230.050:2107): pid=21466 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16595 res=0 07:13:50 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1209.483698][ T26] audit: type=1804 audit(1574493230.080:2108): pid=21466 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/577/file0" dev="sda1" ino=16595 res=1 [ 1209.514089][ T26] audit: type=1800 audit(1574493230.090:2109): pid=21469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16781 res=0 [ 1209.574909][ T26] audit: type=1804 audit(1574493230.100:2110): pid=21469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/400/file0" dev="sda1" ino=16781 res=1 07:13:50 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1210.388442][ T7755] device hsr_slave_0 left promiscuous mode [ 1210.428318][ T7755] device hsr_slave_1 left promiscuous mode [ 1210.475495][ T7755] team0 (unregistering): Port device team_slave_1 removed [ 1210.486384][ T7755] team0 (unregistering): Port device team_slave_0 removed [ 1210.496727][ T7755] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1210.542013][ T7755] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1210.619503][ T7755] bond0 (unregistering): Released all slaves [ 1211.558686][T21482] IPVS: ftp: loaded support on port[0] = 21 [ 1211.608671][T21482] chnl_net:caif_netlink_parms(): no params data found [ 1211.636491][T21482] bridge0: port 1(bridge_slave_0) entered blocking state [ 1211.643768][T21482] bridge0: port 1(bridge_slave_0) entered disabled state [ 1211.651892][T21482] device bridge_slave_0 entered promiscuous mode [ 1211.659438][T21482] bridge0: port 2(bridge_slave_1) entered blocking state [ 1211.666663][T21482] bridge0: port 2(bridge_slave_1) entered disabled state [ 1211.674494][T21482] device bridge_slave_1 entered promiscuous mode [ 1211.691444][T21482] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1211.702304][T21482] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1211.721011][T21482] team0: Port device team_slave_0 added [ 1211.728010][T21482] team0: Port device team_slave_1 added [ 1211.800287][T21482] device hsr_slave_0 entered promiscuous mode [ 1211.868590][T21482] device hsr_slave_1 entered promiscuous mode [ 1211.938325][T21482] debugfs: Directory 'hsr0' with parent '/' already present! [ 1211.973195][T21482] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1211.984576][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1211.992544][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1212.002190][T21482] 8021q: adding VLAN 0 to HW filter on device team0 [ 1212.011057][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1212.019929][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1212.028196][T20467] bridge0: port 1(bridge_slave_0) entered blocking state [ 1212.035252][T20467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1212.043608][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1212.052909][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1212.061631][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1212.070031][ T7869] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.077047][ T7869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1212.086929][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1212.105378][T21482] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1212.116203][T21482] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1212.127757][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1212.136722][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1212.145245][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1212.153796][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1212.162330][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1212.170865][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1212.179572][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1212.188002][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1212.195602][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1212.211869][T21482] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1212.220331][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1212.227729][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1212.322325][T21493] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1213.380377][ T7755] device bridge_slave_1 left promiscuous mode [ 1213.386584][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1213.479025][ T7755] device bridge_slave_0 left promiscuous mode [ 1213.485259][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1214.178522][ T7755] device hsr_slave_0 left promiscuous mode [ 1214.228366][ T7755] device hsr_slave_1 left promiscuous mode [ 1214.304323][ T7755] team0 (unregistering): Port device team_slave_1 removed [ 1214.315035][ T7755] team0 (unregistering): Port device team_slave_0 removed [ 1214.324497][ T7755] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1214.372304][ T7755] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1214.429834][ T7755] bond0 (unregistering): Released all slaves 07:13:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000340)=0x1) 07:13:59 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:13:59 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:13:59 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:13:59 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1ff) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1218.905096][ T26] audit: type=1800 audit(1574493239.540:2111): pid=21498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16532 res=0 [ 1218.944210][ T26] audit: type=1800 audit(1574493239.540:2112): pid=21501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16782 res=0 [ 1219.056985][ T26] audit: type=1804 audit(1574493239.570:2113): pid=21498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/401/file0" dev="sda1" ino=16532 res=1 [ 1219.089521][ T26] audit: type=1804 audit(1574493239.570:2114): pid=21501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/578/file0" dev="sda1" ino=16782 res=1 07:14:01 executing program 2: sched_setattr(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000002c0)=@v2, 0x14, 0x0) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', &(0x7f0000227f74)=""/140, 0x8c) 07:14:01 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:01 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x1ff) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:01 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, 0x0) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:01 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1220.750458][ T26] audit: type=1800 audit(1574493241.390:2115): pid=21508 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16792 res=0 07:14:01 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1220.785570][ T26] audit: type=1804 audit(1574493241.410:2116): pid=21508 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/402/file0" dev="sda1" ino=16792 res=1 [ 1220.826415][ T26] audit: type=1800 audit(1574493241.410:2117): pid=21512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16794 res=0 07:14:01 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1220.899946][ T26] audit: type=1804 audit(1574493241.420:2118): pid=21512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/579/file0" dev="sda1" ino=16794 res=1 [ 1221.017785][T21521] IPVS: ftp: loaded support on port[0] = 21 [ 1221.087511][ T26] audit: type=1800 audit(1574493241.720:2119): pid=21525 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16784 res=0 [ 1221.126620][ T26] audit: type=1804 audit(1574493241.750:2120): pid=21525 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/403/file0" dev="sda1" ino=16784 res=1 [ 1221.143768][T21521] chnl_net:caif_netlink_parms(): no params data found [ 1221.182900][T21521] bridge0: port 1(bridge_slave_0) entered blocking state [ 1221.190077][T21521] bridge0: port 1(bridge_slave_0) entered disabled state [ 1221.198061][T21521] device bridge_slave_0 entered promiscuous mode [ 1221.206480][T21521] bridge0: port 2(bridge_slave_1) entered blocking state [ 1221.213874][T21521] bridge0: port 2(bridge_slave_1) entered disabled state [ 1221.223870][T21521] device bridge_slave_1 entered promiscuous mode [ 1221.243039][T21521] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1221.254212][T21521] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1221.274812][T21521] team0: Port device team_slave_0 added [ 1221.281837][T21521] team0: Port device team_slave_1 added [ 1221.370867][T21521] device hsr_slave_0 entered promiscuous mode [ 1221.408685][T21521] device hsr_slave_1 entered promiscuous mode [ 1221.458823][T21521] debugfs: Directory 'hsr0' with parent '/' already present! [ 1221.480704][T21521] bridge0: port 2(bridge_slave_1) entered blocking state [ 1221.487801][T21521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1221.495109][T21521] bridge0: port 1(bridge_slave_0) entered blocking state [ 1221.502178][T21521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1221.536396][T21521] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1221.548480][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1221.556562][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1221.565403][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1221.576509][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1221.589892][T21521] 8021q: adding VLAN 0 to HW filter on device team0 [ 1221.601621][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1221.610621][ T7869] bridge0: port 1(bridge_slave_0) entered blocking state [ 1221.617675][ T7869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1221.641587][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1221.650701][ T7647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1221.657749][ T7647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1221.667338][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1221.677250][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1221.692874][T21521] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1221.703883][T21521] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1221.719143][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1221.727551][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1221.736932][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1221.756987][T21521] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1221.778148][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1221.796900][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1221.815589][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1221.951518][T21538] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1223.038923][ T7755] device bridge_slave_1 left promiscuous mode [ 1223.045285][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1223.108947][ T7755] device bridge_slave_0 left promiscuous mode [ 1223.115165][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1223.788538][ T7755] device hsr_slave_0 left promiscuous mode [ 1223.858509][ T7755] device hsr_slave_1 left promiscuous mode [ 1223.905369][ T7755] team0 (unregistering): Port device team_slave_1 removed [ 1223.915810][ T7755] team0 (unregistering): Port device team_slave_0 removed [ 1223.926107][ T7755] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1223.982182][ T7755] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1224.048651][ T7755] bond0 (unregistering): Released all slaves 07:14:12 executing program 5: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000300)="bd63412ac682bd4a2265b3bf64b6c9503c3f20", 0x13) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)={0x8, 0x6, 0x8, 0x5, 0xffffffca}) 07:14:12 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, 0x0) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:12 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:12 executing program 1: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:12 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:14:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) close(r4) 07:14:13 executing program 1: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1232.402302][ T26] audit: type=1800 audit(1574493253.040:2121): pid=21552 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16535 res=0 [ 1232.426661][ T26] audit: type=1804 audit(1574493253.040:2122): pid=21552 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/404/file0" dev="sda1" ino=16535 res=1 [ 1232.462171][ T26] audit: type=1800 audit(1574493253.040:2123): pid=21553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16521 res=0 [ 1232.490357][ T26] audit: type=1804 audit(1574493253.040:2124): pid=21553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/580/file0" dev="sda1" ino=16521 res=1 07:14:13 executing program 1: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:13 executing program 1: creat(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:13 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, 0x0) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:13 executing program 1: creat(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:13 executing program 1: creat(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1233.226643][ T26] audit: type=1800 audit(1574493253.860:2125): pid=21571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16644 res=0 [ 1233.287791][ T26] audit: type=1804 audit(1574493253.890:2126): pid=21570 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/581/file0" dev="sda1" ino=16644 res=1 [ 1234.781599][T21580] IPVS: ftp: loaded support on port[0] = 21 [ 1234.831970][T21580] chnl_net:caif_netlink_parms(): no params data found [ 1234.857435][T21580] bridge0: port 1(bridge_slave_0) entered blocking state [ 1234.864537][T21580] bridge0: port 1(bridge_slave_0) entered disabled state [ 1234.872518][T21580] device bridge_slave_0 entered promiscuous mode [ 1234.880141][T21580] bridge0: port 2(bridge_slave_1) entered blocking state [ 1234.887225][T21580] bridge0: port 2(bridge_slave_1) entered disabled state [ 1234.895180][T21580] device bridge_slave_1 entered promiscuous mode [ 1234.912030][T21580] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1234.923153][T21580] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1234.941412][T21580] team0: Port device team_slave_0 added [ 1234.948153][T21580] team0: Port device team_slave_1 added [ 1235.031410][T21580] device hsr_slave_0 entered promiscuous mode [ 1235.078808][T21580] device hsr_slave_1 entered promiscuous mode [ 1235.118318][T21580] debugfs: Directory 'hsr0' with parent '/' already present! [ 1235.132570][T21580] bridge0: port 2(bridge_slave_1) entered blocking state [ 1235.139664][T21580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1235.146880][T21580] bridge0: port 1(bridge_slave_0) entered blocking state [ 1235.154025][T21580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1235.181965][T21580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1235.193132][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1235.201416][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1235.209310][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1235.217964][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1235.230869][T21580] 8021q: adding VLAN 0 to HW filter on device team0 [ 1235.241472][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1235.249943][ T7647] bridge0: port 1(bridge_slave_0) entered blocking state [ 1235.256960][ T7647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1235.266834][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1235.275238][T19914] bridge0: port 2(bridge_slave_1) entered blocking state [ 1235.282314][T19914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1235.301450][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1235.310402][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1235.319509][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1235.331902][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1235.342563][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1235.352565][T21580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1235.366256][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1235.373735][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1235.383913][T21580] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1235.514923][T21589] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1236.449043][ T8002] device bridge_slave_1 left promiscuous mode [ 1236.455376][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 1236.512195][ T8002] device bridge_slave_0 left promiscuous mode [ 1236.519199][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 1237.218644][ T8002] device hsr_slave_0 left promiscuous mode [ 1237.278312][ T8002] device hsr_slave_1 left promiscuous mode [ 1237.334848][ T8002] team0 (unregistering): Port device team_slave_1 removed [ 1237.345072][ T8002] team0 (unregistering): Port device team_slave_0 removed [ 1237.355511][ T8002] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1237.401429][ T8002] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1237.468421][ T8002] bond0 (unregistering): Released all slaves 07:14:24 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000008940)={&(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10, 0x0}, 0xe9f7f98275fdde48) 07:14:24 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:24 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:24 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x0, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:24 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:14:24 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x34}, [@ldst={0x5}]}, &(0x7f0000000200)='syzkaller\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x135}, 0x48) [ 1243.724800][ T26] audit: type=1800 audit(1574493264.360:2127): pid=21597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16737 res=0 07:14:24 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1243.790283][ T26] audit: type=1804 audit(1574493264.360:2128): pid=21597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/405/file0" dev="sda1" ino=16737 res=1 [ 1243.889891][ T26] audit: type=1800 audit(1574493264.410:2129): pid=21602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16520 res=0 [ 1243.922785][ T26] audit: type=1804 audit(1574493264.420:2130): pid=21595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/582/file0" dev="sda1" ino=16520 res=1 07:14:24 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:24 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:25 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:25 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:25 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x0, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1244.755346][ T26] audit: type=1800 audit(1574493265.390:2131): pid=21618 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16595 res=0 [ 1244.839254][ T26] audit: type=1804 audit(1574493265.430:2132): pid=21618 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/406/file0" dev="sda1" ino=16595 res=1 [ 1244.937399][ T26] audit: type=1800 audit(1574493265.470:2133): pid=21622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16643 res=0 [ 1244.987995][ T26] audit: type=1804 audit(1574493265.470:2134): pid=21622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/583/file0" dev="sda1" ino=16643 res=1 [ 1246.214512][T21631] IPVS: ftp: loaded support on port[0] = 21 [ 1246.265952][T21631] chnl_net:caif_netlink_parms(): no params data found [ 1246.290876][T21631] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.297939][T21631] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.305787][T21631] device bridge_slave_0 entered promiscuous mode [ 1246.314093][T21631] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.321196][T21631] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.329221][T21631] device bridge_slave_1 entered promiscuous mode [ 1246.346243][T21631] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1246.357150][T21631] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1246.376342][T21631] team0: Port device team_slave_0 added [ 1246.383136][T21631] team0: Port device team_slave_1 added [ 1246.440783][T21631] device hsr_slave_0 entered promiscuous mode [ 1246.478847][T21631] device hsr_slave_1 entered promiscuous mode [ 1246.548301][T21631] debugfs: Directory 'hsr0' with parent '/' already present! [ 1246.562238][T21631] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.569349][T21631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1246.576579][T21631] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.583646][T21631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1246.612957][T21631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1246.624009][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1246.632378][T20467] bridge0: port 1(bridge_slave_0) entered disabled state [ 1246.640324][T20467] bridge0: port 2(bridge_slave_1) entered disabled state [ 1246.649747][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1246.661589][T21631] 8021q: adding VLAN 0 to HW filter on device team0 [ 1246.671485][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1246.679829][T20467] bridge0: port 1(bridge_slave_0) entered blocking state [ 1246.686849][T20467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1246.697359][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1246.705870][ T7647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1246.712927][ T7647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1246.731464][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1246.740528][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1246.749609][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1246.762184][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1246.773388][T21631] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1246.784681][T21631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1246.792812][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1246.809127][T21631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1246.816809][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1246.824597][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1246.956144][T21641] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1248.028910][T19966] device bridge_slave_1 left promiscuous mode [ 1248.035138][T19966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1248.098973][T19966] device bridge_slave_0 left promiscuous mode [ 1248.105191][T19966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1248.818521][T19966] device hsr_slave_0 left promiscuous mode [ 1248.858308][T19966] device hsr_slave_1 left promiscuous mode [ 1248.915054][T19966] team0 (unregistering): Port device team_slave_1 removed [ 1248.925847][T19966] team0 (unregistering): Port device team_slave_0 removed [ 1248.936090][T19966] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1248.991984][T19966] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1249.078574][T19966] bond0 (unregistering): Released all slaves 07:14:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f0000000100)={0x0, &(0x7f0000000180)="52eb7eb5828985dd897bc622ec6689dee01eeecdfbb0bb14d0b9310257318cb6803e63400a3e57f4281982ad6b643cc747cd"}) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x284, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffe00}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_BEARER={0xb8, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x284}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:14:35 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:35 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:35 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x0, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:35 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:14:35 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{}, "018000da7d469c04", "02a839a6c7986edc3f8a6200c88e37de79b97525cedefaa0bded32e7d887ec99", "0000ef00", "00943f4aece800"}, 0x38) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}], 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000b80)=ANY=[@ANYBLOB="23ff1f0a8117fb62d5eb1b3c750c75c5533f018823a16997c30a069cb5b742686128af8baad097514187691d92010000009e3db9e86db57e1d384bfe3042c49ef9134937af481f2b44e023b3884e0efb76d2659a715f3b513e33fd96c9d3c9afed9390b357a4000000000000000a010000000003000000000832ff0769dea9ed32487d2bf1ac37afcf98d817857774004608d609000000701f793b97fdcccc622708000000e69857745a81f6ffbe89000097559772f645e9898fb9d669af77550098329a0aa58aa500"], 0xc9) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0xa, 0x0, 0x27) 07:14:35 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1255.092474][ T26] audit: type=1800 audit(1574493275.730:2135): pid=21647 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16547 res=0 [ 1255.129265][ T26] audit: type=1800 audit(1574493275.730:2136): pid=21652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16562 res=0 [ 1255.261554][ T26] audit: type=1804 audit(1574493275.730:2137): pid=21652 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/584/file0" dev="sda1" ino=16562 res=1 07:14:35 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1255.290818][ T26] audit: type=1804 audit(1574493275.770:2138): pid=21647 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/407/file0" dev="sda1" ino=16547 res=1 07:14:36 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:36 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:36 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:36 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1256.114136][ T26] audit: type=1800 audit(1574493276.750:2139): pid=21673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16521 res=0 [ 1256.207950][ T26] audit: type=1804 audit(1574493276.760:2140): pid=21673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/408/file0" dev="sda1" ino=16521 res=1 [ 1257.576545][T21680] IPVS: ftp: loaded support on port[0] = 21 [ 1257.625414][T21680] chnl_net:caif_netlink_parms(): no params data found [ 1257.651291][T21680] bridge0: port 1(bridge_slave_0) entered blocking state [ 1257.658663][T21680] bridge0: port 1(bridge_slave_0) entered disabled state [ 1257.666310][T21680] device bridge_slave_0 entered promiscuous mode [ 1257.673887][T21680] bridge0: port 2(bridge_slave_1) entered blocking state [ 1257.680978][T21680] bridge0: port 2(bridge_slave_1) entered disabled state [ 1257.689234][T21680] device bridge_slave_1 entered promiscuous mode [ 1257.706307][T21680] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1257.716886][T21680] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1257.735654][T21680] team0: Port device team_slave_0 added [ 1257.742520][T21680] team0: Port device team_slave_1 added [ 1257.810813][T21680] device hsr_slave_0 entered promiscuous mode [ 1257.858759][T21680] device hsr_slave_1 entered promiscuous mode [ 1257.918390][T21680] debugfs: Directory 'hsr0' with parent '/' already present! [ 1257.932190][T21680] bridge0: port 2(bridge_slave_1) entered blocking state [ 1257.939292][T21680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1257.946524][T21680] bridge0: port 1(bridge_slave_0) entered blocking state [ 1257.953616][T21680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1257.981995][T21680] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1257.992863][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1258.001527][ T7869] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.009922][ T7869] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.018700][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1258.030286][T21680] 8021q: adding VLAN 0 to HW filter on device team0 [ 1258.040884][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1258.049275][T19395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.056283][T19395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1258.079933][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1258.088588][ T7869] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.095611][ T7869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1258.104171][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1258.112809][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1258.121343][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1258.129704][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1258.139126][T21680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1258.146752][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1258.161616][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1258.169186][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1258.181381][T21680] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1258.309778][T21691] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1259.479074][T19966] device bridge_slave_1 left promiscuous mode [ 1259.485307][T19966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1259.528903][T19966] device bridge_slave_0 left promiscuous mode [ 1259.535149][T19966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1260.208494][T19966] device hsr_slave_0 left promiscuous mode [ 1260.248326][T19966] device hsr_slave_1 left promiscuous mode [ 1260.305273][T19966] team0 (unregistering): Port device team_slave_1 removed [ 1260.315357][T19966] team0 (unregistering): Port device team_slave_0 removed [ 1260.325413][T19966] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1260.371603][T19966] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1260.447178][T19966] bond0 (unregistering): Released all slaves 07:14:46 executing program 5: 07:14:46 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000380)='nfs\x00', 0x0, &(0x7f000000a000)) 07:14:46 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:46 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:14:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) [ 1265.699536][ T26] audit: type=1800 audit(1574493286.330:2141): pid=21704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16593 res=0 [ 1265.731198][ T26] audit: type=1800 audit(1574493286.360:2142): pid=21707 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16535 res=0 07:14:46 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) [ 1265.783443][ T26] audit: type=1804 audit(1574493286.360:2143): pid=21704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/409/file0" dev="sda1" ino=16593 res=1 [ 1265.857479][ T26] audit: type=1804 audit(1574493286.360:2144): pid=21707 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/585/file0" dev="sda1" ino=16535 res=1 07:14:46 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) 07:14:47 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f000000a000)) 07:14:47 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, 0x0) 07:14:47 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:47 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1266.741066][ T26] audit: type=1800 audit(1574493287.370:2145): pid=21727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16626 res=0 [ 1266.826764][ T26] audit: type=1804 audit(1574493287.400:2146): pid=21727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/410/file0" dev="sda1" ino=16626 res=1 [ 1266.942441][ T26] audit: type=1800 audit(1574493287.430:2147): pid=21730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16708 res=0 [ 1266.968604][ T26] audit: type=1804 audit(1574493287.450:2148): pid=21730 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/586/file0" dev="sda1" ino=16708 res=1 [ 1268.097354][T21738] IPVS: ftp: loaded support on port[0] = 21 [ 1268.148145][T21738] chnl_net:caif_netlink_parms(): no params data found [ 1268.174086][T21738] bridge0: port 1(bridge_slave_0) entered blocking state [ 1268.181238][T21738] bridge0: port 1(bridge_slave_0) entered disabled state [ 1268.189126][T21738] device bridge_slave_0 entered promiscuous mode [ 1268.196631][T21738] bridge0: port 2(bridge_slave_1) entered blocking state [ 1268.203913][T21738] bridge0: port 2(bridge_slave_1) entered disabled state [ 1268.211776][T21738] device bridge_slave_1 entered promiscuous mode [ 1268.229025][T21738] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1268.239999][T21738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1268.257204][T21738] team0: Port device team_slave_0 added [ 1268.264061][T21738] team0: Port device team_slave_1 added [ 1268.330573][T21738] device hsr_slave_0 entered promiscuous mode [ 1268.378588][T21738] device hsr_slave_1 entered promiscuous mode [ 1268.428431][T21738] debugfs: Directory 'hsr0' with parent '/' already present! [ 1268.442585][T21738] bridge0: port 2(bridge_slave_1) entered blocking state [ 1268.449649][T21738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1268.456903][T21738] bridge0: port 1(bridge_slave_0) entered blocking state [ 1268.463973][T21738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1268.492836][T21738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1268.503858][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1268.512332][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1268.520384][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1268.529442][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1268.540683][T21738] 8021q: adding VLAN 0 to HW filter on device team0 [ 1268.551186][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1268.559539][T19395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1268.566546][T19395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1268.576546][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1268.585282][ T7647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1268.592339][ T7647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1268.610787][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1268.619875][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1268.628718][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1268.639528][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1268.650828][T21738] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1268.661908][T21738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1268.670256][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1268.684809][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1268.692366][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1268.703389][T21738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1268.837868][T21748] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1269.878890][ T7755] device bridge_slave_1 left promiscuous mode [ 1269.885104][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1269.949130][ T7755] device bridge_slave_0 left promiscuous mode [ 1269.955346][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.668580][ T7755] device hsr_slave_0 left promiscuous mode [ 1270.728323][ T7755] device hsr_slave_1 left promiscuous mode [ 1270.774873][ T7755] team0 (unregistering): Port device team_slave_1 removed [ 1270.785482][ T7755] team0 (unregistering): Port device team_slave_0 removed [ 1270.795770][ T7755] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1270.852306][ T7755] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1270.909562][ T7755] bond0 (unregistering): Released all slaves 07:14:56 executing program 5: 07:14:56 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, 0x0) 07:14:56 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:56 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:14:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:14:56 executing program 2: [ 1276.067600][ T26] audit: type=1800 audit(1574493296.700:2149): pid=21755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16519 res=0 [ 1276.133802][ T26] audit: type=1804 audit(1574493296.710:2150): pid=21755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/587/file0" dev="sda1" ino=16519 res=1 07:14:56 executing program 1: creat(&(0x7f00000013c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='nfs\x00', 0x0, 0x0) [ 1276.219381][ T26] audit: type=1800 audit(1574493296.750:2151): pid=21759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16556 res=0 [ 1276.327397][ T26] audit: type=1804 audit(1574493296.760:2152): pid=21757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/411/file0" dev="sda1" ino=16556 res=1 07:14:57 executing program 1: 07:14:57 executing program 1: 07:14:57 executing program 1: 07:14:57 executing program 1: 07:14:57 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(0x0, 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1278.438433][T21782] IPVS: ftp: loaded support on port[0] = 21 [ 1278.488356][T21782] chnl_net:caif_netlink_parms(): no params data found [ 1278.514481][T21782] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.521608][T21782] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.529463][T21782] device bridge_slave_0 entered promiscuous mode [ 1278.536814][T21782] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.543997][T21782] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.551562][T21782] device bridge_slave_1 entered promiscuous mode [ 1278.568727][T21782] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1278.579603][T21782] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1278.597599][T21782] team0: Port device team_slave_0 added [ 1278.604909][T21782] team0: Port device team_slave_1 added [ 1278.670409][T21782] device hsr_slave_0 entered promiscuous mode [ 1278.708747][T21782] device hsr_slave_1 entered promiscuous mode [ 1278.748384][T21782] debugfs: Directory 'hsr0' with parent '/' already present! [ 1278.762758][T21782] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.769786][T21782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1278.777161][T21782] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.784186][T21782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1278.811703][T21782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1278.822713][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1278.831198][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.839320][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.848382][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1278.859589][T21782] 8021q: adding VLAN 0 to HW filter on device team0 [ 1278.869470][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1278.877800][T19395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1278.884839][T19395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1278.895138][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1278.906393][ T7647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1278.913420][ T7647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1278.930025][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1278.939025][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1278.949392][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1278.963436][T21782] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1278.974152][T21782] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1278.988893][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1278.997347][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1279.008680][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1279.024496][T21782] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1279.032499][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1279.040333][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1279.150132][T21792] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1280.179608][ T23] device bridge_slave_1 left promiscuous mode [ 1280.185900][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 1280.239204][ T23] device bridge_slave_0 left promiscuous mode [ 1280.245481][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 1280.938594][ T23] device hsr_slave_0 left promiscuous mode [ 1280.988312][ T23] device hsr_slave_1 left promiscuous mode [ 1281.054544][ T23] team0 (unregistering): Port device team_slave_1 removed [ 1281.064875][ T23] team0 (unregistering): Port device team_slave_0 removed [ 1281.074731][ T23] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1281.132136][ T23] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1281.189610][ T23] bond0 (unregistering): Released all slaves 07:15:02 executing program 5: 07:15:02 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:02 executing program 1: 07:15:02 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(0x0, 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:02 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:15:02 executing program 2: 07:15:03 executing program 1: [ 1282.428273][ T26] audit: type=1800 audit(1574493303.050:2153): pid=21799 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16559 res=0 [ 1282.472691][ T26] audit: type=1804 audit(1574493303.100:2154): pid=21799 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/412/file0" dev="sda1" ino=16559 res=1 07:15:03 executing program 1: 07:15:03 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(0x0, 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000200)=""/124, 0x7c}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x5e36, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) readv(r2, &(0x7f00000019c0)=[{&(0x7f00000008c0)=""/4096, 0x1000}], 0x1) shutdown(r1, 0x0) 07:15:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\f\x00', 0x1132}) 07:15:03 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1284.549410][T21828] IPVS: ftp: loaded support on port[0] = 21 [ 1284.599889][T21828] chnl_net:caif_netlink_parms(): no params data found [ 1284.625895][T21828] bridge0: port 1(bridge_slave_0) entered blocking state [ 1284.633123][T21828] bridge0: port 1(bridge_slave_0) entered disabled state [ 1284.641138][T21828] device bridge_slave_0 entered promiscuous mode [ 1284.648709][T21828] bridge0: port 2(bridge_slave_1) entered blocking state [ 1284.655760][T21828] bridge0: port 2(bridge_slave_1) entered disabled state [ 1284.663813][T21828] device bridge_slave_1 entered promiscuous mode [ 1284.679814][T21828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1284.690641][T21828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1284.708925][T21828] team0: Port device team_slave_0 added [ 1284.715773][T21828] team0: Port device team_slave_1 added [ 1284.790475][T21828] device hsr_slave_0 entered promiscuous mode [ 1284.848647][T21828] device hsr_slave_1 entered promiscuous mode [ 1284.908307][T21828] debugfs: Directory 'hsr0' with parent '/' already present! [ 1284.922448][T21828] bridge0: port 2(bridge_slave_1) entered blocking state [ 1284.929505][T21828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1284.936822][T21828] bridge0: port 1(bridge_slave_0) entered blocking state [ 1284.943980][T21828] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1284.972503][T21828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1284.984098][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1284.992503][T19395] bridge0: port 1(bridge_slave_0) entered disabled state [ 1285.000366][T19395] bridge0: port 2(bridge_slave_1) entered disabled state [ 1285.009247][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1285.020514][T21828] 8021q: adding VLAN 0 to HW filter on device team0 [ 1285.031068][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1285.039304][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1285.046306][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1285.056687][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1285.065426][T19395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1285.072608][T19395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1285.091207][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1285.099814][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1285.113211][T21828] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1285.123792][T21828] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1285.137999][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1285.146125][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1285.154718][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1285.163546][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1285.176883][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1285.186659][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1285.197206][T21828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1285.317652][T21837] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1286.358926][ T7755] device bridge_slave_1 left promiscuous mode [ 1286.365361][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1286.421622][ T7755] device bridge_slave_0 left promiscuous mode [ 1286.427832][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.118467][ T7755] device hsr_slave_0 left promiscuous mode [ 1287.168349][ T7755] device hsr_slave_1 left promiscuous mode [ 1287.234765][ T7755] team0 (unregistering): Port device team_slave_1 removed [ 1287.245108][ T7755] team0 (unregistering): Port device team_slave_0 removed [ 1287.255101][ T7755] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1287.311373][ T7755] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1287.388607][ T7755] bond0 (unregistering): Released all slaves 07:15:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8400ae8e, &(0x7f00000000c0)) 07:15:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) setsockopt$sock_attach_bpf(r0, 0x6, 0x17, &(0x7f0000000200)=r1, 0x4) 07:15:09 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:09 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:09 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1288.650513][ T26] audit: type=1800 audit(1574493309.290:2155): pid=21844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16528 res=0 [ 1288.695081][ T26] audit: type=1804 audit(1574493309.310:2156): pid=21844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/413/file0" dev="sda1" ino=16528 res=1 [ 1290.470581][T21851] IPVS: ftp: loaded support on port[0] = 21 [ 1290.519383][T21851] chnl_net:caif_netlink_parms(): no params data found [ 1290.544817][T21851] bridge0: port 1(bridge_slave_0) entered blocking state [ 1290.551976][T21851] bridge0: port 1(bridge_slave_0) entered disabled state [ 1290.559849][T21851] device bridge_slave_0 entered promiscuous mode [ 1290.567482][T21851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1290.574852][T21851] bridge0: port 2(bridge_slave_1) entered disabled state [ 1290.582813][T21851] device bridge_slave_1 entered promiscuous mode [ 1290.601051][T21851] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1290.611779][T21851] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1290.630881][T21851] team0: Port device team_slave_0 added [ 1290.637716][T21851] team0: Port device team_slave_1 added [ 1290.690776][T21851] device hsr_slave_0 entered promiscuous mode [ 1290.738864][T21851] device hsr_slave_1 entered promiscuous mode [ 1290.788395][T21851] debugfs: Directory 'hsr0' with parent '/' already present! [ 1290.802469][T21851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1290.809532][T21851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1290.816766][T21851] bridge0: port 1(bridge_slave_0) entered blocking state [ 1290.823850][T21851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1290.853121][T21851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1290.863968][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1290.872140][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1290.880354][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1290.889194][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1290.901637][T21851] 8021q: adding VLAN 0 to HW filter on device team0 [ 1290.911334][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1290.919976][T19914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1290.926997][T19914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1290.937012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1290.945959][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1290.953000][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1290.971505][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1290.980911][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1290.989952][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1291.000986][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1291.011342][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1291.021576][T21851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1291.035083][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1291.042799][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1291.054420][T21851] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1291.164527][T21863] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1292.278924][ T7755] device bridge_slave_1 left promiscuous mode [ 1292.286218][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1292.328911][ T7755] device bridge_slave_0 left promiscuous mode [ 1292.335127][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1292.998670][ T7755] device hsr_slave_0 left promiscuous mode [ 1293.038398][ T7755] device hsr_slave_1 left promiscuous mode [ 1293.104762][ T7755] team0 (unregistering): Port device team_slave_1 removed [ 1293.115030][ T7755] team0 (unregistering): Port device team_slave_0 removed [ 1293.125272][ T7755] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1293.181929][ T7755] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1293.258313][ T7755] bond0 (unregistering): Released all slaves 07:15:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 07:15:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0$v', 0x420000015001}) 07:15:15 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:15 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:15 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1294.803195][ T26] audit: type=1800 audit(1574493315.440:2157): pid=21868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16561 res=0 [ 1294.843768][ T26] audit: type=1804 audit(1574493315.470:2158): pid=21868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/414/file0" dev="sda1" ino=16561 res=1 07:15:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000040)={0x7ff}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0x20) recvfrom$inet(r0, 0x0, 0x1000000b7, 0x40002, 0x0, 0x800e00599) shutdown(r0, 0x0) 07:15:15 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1295.101048][ T26] audit: type=1800 audit(1574493315.740:2159): pid=21878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16593 res=0 [ 1296.835421][T21883] IPVS: ftp: loaded support on port[0] = 21 [ 1296.893423][T21883] chnl_net:caif_netlink_parms(): no params data found [ 1296.919756][T21883] bridge0: port 1(bridge_slave_0) entered blocking state [ 1296.926921][T21883] bridge0: port 1(bridge_slave_0) entered disabled state [ 1296.934644][T21883] device bridge_slave_0 entered promiscuous mode [ 1296.942217][T21883] bridge0: port 2(bridge_slave_1) entered blocking state [ 1296.949369][T21883] bridge0: port 2(bridge_slave_1) entered disabled state [ 1296.957201][T21883] device bridge_slave_1 entered promiscuous mode [ 1296.974822][T21883] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1296.985538][T21883] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1297.004286][T21883] team0: Port device team_slave_0 added [ 1297.011328][T21883] team0: Port device team_slave_1 added [ 1297.049902][T21883] device hsr_slave_0 entered promiscuous mode [ 1297.098777][T21883] device hsr_slave_1 entered promiscuous mode [ 1297.138423][T21883] debugfs: Directory 'hsr0' with parent '/' already present! [ 1297.152389][T21883] bridge0: port 2(bridge_slave_1) entered blocking state [ 1297.159435][T21883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1297.166650][T21883] bridge0: port 1(bridge_slave_0) entered blocking state [ 1297.173688][T21883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1297.202286][T21883] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1297.213207][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1297.221519][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1297.229741][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1297.238597][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1297.249844][T21883] 8021q: adding VLAN 0 to HW filter on device team0 [ 1297.260060][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1297.268786][T19914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1297.275811][T19914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1297.288819][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1297.297176][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1297.304240][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1297.317468][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1297.326880][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1297.337730][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1297.350182][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1297.361190][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1297.371392][T21883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1297.385759][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1297.393253][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1297.403870][T21883] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1297.535219][T21894] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1298.589268][ T8002] device bridge_slave_1 left promiscuous mode [ 1298.595504][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 1298.649339][ T8002] device bridge_slave_0 left promiscuous mode [ 1298.655588][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.368539][ T8002] device hsr_slave_0 left promiscuous mode [ 1299.408339][ T8002] device hsr_slave_1 left promiscuous mode [ 1299.455149][ T8002] team0 (unregistering): Port device team_slave_1 removed [ 1299.465800][ T8002] team0 (unregistering): Port device team_slave_0 removed [ 1299.476426][ T8002] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1299.532401][ T8002] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1299.591278][ T8002] bond0 (unregistering): Released all slaves 07:15:22 executing program 5: mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) inotify_init1(0x80000) 07:15:22 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000000080)={0x2, 0x18, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x2, 0x0, @loopback}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@rand_addr="15a854f4581e213500", @in6=@remote}}]}, 0xa0}}, 0x0) 07:15:22 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:22 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:22 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1302.287964][ T26] audit: type=1800 audit(1574493322.920:2160): pid=21905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16520 res=0 [ 1302.317515][ T26] audit: type=1804 audit(1574493322.920:2161): pid=21905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/415/file0" dev="sda1" ino=16520 res=1 [ 1302.348601][ T26] audit: type=1800 audit(1574493322.920:2162): pid=21901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16721 res=0 [ 1304.251443][T21913] IPVS: ftp: loaded support on port[0] = 21 [ 1304.313159][T21913] chnl_net:caif_netlink_parms(): no params data found [ 1304.338793][T21913] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.345954][T21913] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.353837][T21913] device bridge_slave_0 entered promiscuous mode [ 1304.361271][T21913] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.368379][T21913] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.376411][T21913] device bridge_slave_1 entered promiscuous mode [ 1304.393682][T21913] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1304.404510][T21913] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1304.422935][T21913] team0: Port device team_slave_0 added [ 1304.429660][T21913] team0: Port device team_slave_1 added [ 1304.510612][T21913] device hsr_slave_0 entered promiscuous mode [ 1304.569015][T21913] device hsr_slave_1 entered promiscuous mode [ 1304.638292][T21913] debugfs: Directory 'hsr0' with parent '/' already present! [ 1304.652450][T21913] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.659649][T21913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1304.666946][T21913] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.674123][T21913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1304.701952][T21913] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1304.713364][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1304.721839][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.729678][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.738446][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1304.751239][T21913] 8021q: adding VLAN 0 to HW filter on device team0 [ 1304.761885][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1304.770257][T20467] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.777258][T20467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1304.787397][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1304.795670][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.802702][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1304.820545][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1304.829464][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1304.840853][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1304.852669][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1304.863788][T21913] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1304.874824][T21913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1304.883007][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1304.899706][T21913] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1304.907519][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1304.915378][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1305.018786][T21922] rtc_cmos 00:00: Alarms can be up to one day in the future 07:15:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x18d, 0x0) 07:15:26 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\f\x00', 0x1132}) 07:15:26 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:26 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, 0x0, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:26 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1306.120935][ T26] audit: type=1800 audit(1574493326.760:2163): pid=21927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16822 res=0 07:15:26 executing program 1: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180), 0xfe0c) sendmmsg$unix(r1, &(0x7f0000000080)=[{&(0x7f0000000100)=@abs={0x1}, 0x6e, 0x0}], 0x1, 0x80020000885) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) r2 = dup2(r0, r0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TIOCCBRK(r2, 0x5428) [ 1306.151650][ T26] audit: type=1804 audit(1574493326.760:2164): pid=21927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/416/file0" dev="sda1" ino=16822 res=1 [ 1306.177702][T21932] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1306.193602][ T26] audit: type=1800 audit(1574493326.770:2165): pid=21933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16825 res=0 07:15:26 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1306.455586][T21948] rtc_cmos 00:00: Alarms can be up to one day in the future 07:15:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 07:15:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg(r3, &(0x7f000000cb80)=[{{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000000400)="a1", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[{0x10}, {0x18, 0x0, 0x0, '\r'}], 0x28}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) 07:15:32 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:32 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:15:32 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, 0x0, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1311.559022][ T26] audit: type=1800 audit(1574493332.190:2166): pid=21963 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16549 res=0 [ 1311.599537][T21960] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1311.608267][ T26] audit: type=1800 audit(1574493332.200:2167): pid=21957 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16562 res=0 [ 1311.638584][ T26] audit: type=1804 audit(1574493332.200:2168): pid=21957 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/597/file0" dev="sda1" ino=16562 res=1 [ 1311.672971][ T26] audit: type=1804 audit(1574493332.230:2169): pid=21963 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/417/file0" dev="sda1" ino=16549 res=1 [ 1312.788975][ T23] device bridge_slave_1 left promiscuous mode [ 1312.795307][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 1312.859133][ T23] device bridge_slave_0 left promiscuous mode [ 1312.865352][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.538737][ T23] device hsr_slave_0 left promiscuous mode [ 1313.638318][ T23] device hsr_slave_1 left promiscuous mode [ 1313.724494][ T23] team0 (unregistering): Port device team_slave_1 removed [ 1313.735440][ T23] team0 (unregistering): Port device team_slave_0 removed [ 1313.745486][ T23] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1313.802580][ T23] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1313.869403][ T23] bond0 (unregistering): Released all slaves 07:15:37 executing program 2: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = creat(0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000002c0)) syz_open_dev$sndtimer(0x0, 0x0, 0xb0a82f114539d690) socket$inet6(0xa, 0x400000000001, 0x0) socket$inet6(0xa, 0x6, 0xc9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0xaa353dff9f842f42}, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="3900000013000d0468fe0704000000000000ff3f06000000450001070000001419001a000400020004000a", 0x2b}], 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000029cc11ce043098b7939b912e7bd8c5004acf53be3ea114ff2047eab21d3fd7044bacfc39e0e6a2697029692400a88625427fac8f24c19e086ff689429343cceed49bfb10125e71cc5f3d852cffd10efbbd7774a7b9d318a688fcd62779d29458de9c2afd4c965ee02ee994fb40cd9355a5e30eecbaecbbd348906d47990d11fd024c856da2fd37dd3843494d72c5126cf3a4fbecf2190cd2d5e8363f264fe7510137db289b13a2d2"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) 07:15:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000200)={0x8}) 07:15:37 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:15:37 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, 0x0, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:37 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1316.751698][ T26] audit: type=1800 audit(1574493337.390:2170): pid=21979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16547 res=0 07:15:37 executing program 1: syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) pipe(0x0) pipe2$9p(&(0x7f0000000240), 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000100)) [ 1316.807011][ T26] audit: type=1804 audit(1574493337.410:2171): pid=21979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/598/file0" dev="sda1" ino=16547 res=1 [ 1316.891674][ T26] audit: type=1800 audit(1574493337.410:2172): pid=21981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16536 res=0 [ 1316.951772][ T26] audit: type=1804 audit(1574493337.430:2173): pid=21981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/418/file0" dev="sda1" ino=16536 res=1 07:15:37 executing program 1: syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) pipe(0x0) pipe2$9p(&(0x7f0000000240), 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000100)) [ 1318.920925][T21998] IPVS: ftp: loaded support on port[0] = 21 [ 1318.969771][T21998] chnl_net:caif_netlink_parms(): no params data found [ 1318.995947][T21998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.003194][T21998] bridge0: port 1(bridge_slave_0) entered disabled state [ 1319.011115][T21998] device bridge_slave_0 entered promiscuous mode [ 1319.018340][T21998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1319.025430][T21998] bridge0: port 2(bridge_slave_1) entered disabled state [ 1319.033194][T21998] device bridge_slave_1 entered promiscuous mode [ 1319.050141][T21998] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1319.060510][T21998] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1319.079345][T21998] team0: Port device team_slave_0 added [ 1319.086105][T21998] team0: Port device team_slave_1 added [ 1319.150907][T21998] device hsr_slave_0 entered promiscuous mode [ 1319.198871][T21998] device hsr_slave_1 entered promiscuous mode [ 1319.238281][T21998] debugfs: Directory 'hsr0' with parent '/' already present! [ 1319.252034][T21998] bridge0: port 2(bridge_slave_1) entered blocking state [ 1319.259068][T21998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1319.266436][T21998] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.273464][T21998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1319.302156][T21998] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1319.313619][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1319.322221][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1319.330110][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1319.339435][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1319.351652][T21998] 8021q: adding VLAN 0 to HW filter on device team0 [ 1319.361900][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1319.370332][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1319.377395][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1319.387797][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1319.396457][T19395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1319.403583][T19395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1319.421688][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1319.430508][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1319.439261][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1319.450326][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1319.463300][T21998] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1319.474799][T21998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1319.483945][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1319.497888][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1319.505549][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1319.516021][T21998] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1319.625860][T22007] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1320.689059][ T23] device bridge_slave_1 left promiscuous mode [ 1320.695225][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 1320.749207][ T23] device bridge_slave_0 left promiscuous mode [ 1320.755422][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 1321.448441][ T23] device hsr_slave_0 left promiscuous mode [ 1321.538514][ T23] device hsr_slave_1 left promiscuous mode [ 1321.584998][ T23] team0 (unregistering): Port device team_slave_1 removed [ 1321.595446][ T23] team0 (unregistering): Port device team_slave_0 removed [ 1321.605234][ T23] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1321.671583][ T23] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1321.759314][ T23] bond0 (unregistering): Released all slaves 07:15:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:15:47 executing program 1: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000300)="bd63412ac682bd4a2265b3bf64b6c9503c3f20", 0x13) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x7) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x440000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) ftruncate(0xffffffffffffffff, 0x8200) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000008c0), 0x4}, 0x0, 0x0, 0x6, 0x6, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) rmdir(&(0x7f0000000380)='./bus\x00') io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000200)={0x8, 0x6, 0x8, 0x5, 0xffffffca}) 07:15:47 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:47 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1327.086776][ T26] audit: type=1800 audit(1574493347.720:2174): pid=22018 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16624 res=0 [ 1327.155980][ T26] audit: type=1804 audit(1574493347.750:2175): pid=22018 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/599/file0" dev="sda1" ino=16624 res=1 [ 1327.264993][ T26] audit: type=1800 audit(1574493347.750:2176): pid=22019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16519 res=0 [ 1327.388599][ T26] audit: type=1804 audit(1574493347.750:2177): pid=22019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/419/file0" dev="sda1" ino=16519 res=1 [ 1329.273569][T22030] IPVS: ftp: loaded support on port[0] = 21 [ 1329.334466][T22030] chnl_net:caif_netlink_parms(): no params data found [ 1329.361209][T22030] bridge0: port 1(bridge_slave_0) entered blocking state [ 1329.368468][T22030] bridge0: port 1(bridge_slave_0) entered disabled state [ 1329.376076][T22030] device bridge_slave_0 entered promiscuous mode [ 1329.383833][T22030] bridge0: port 2(bridge_slave_1) entered blocking state [ 1329.390917][T22030] bridge0: port 2(bridge_slave_1) entered disabled state [ 1329.398781][T22030] device bridge_slave_1 entered promiscuous mode [ 1329.415240][T22030] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1329.426402][T22030] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1329.445048][T22030] team0: Port device team_slave_0 added [ 1329.452042][T22030] team0: Port device team_slave_1 added [ 1329.520840][T22030] device hsr_slave_0 entered promiscuous mode [ 1329.558682][T22030] device hsr_slave_1 entered promiscuous mode [ 1329.608305][T22030] debugfs: Directory 'hsr0' with parent '/' already present! [ 1329.623076][T22030] bridge0: port 2(bridge_slave_1) entered blocking state [ 1329.630213][T22030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1329.637648][T22030] bridge0: port 1(bridge_slave_0) entered blocking state [ 1329.644699][T22030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1329.674317][T22030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1329.685238][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1329.693807][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1329.701848][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1329.710835][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1329.722803][T22030] 8021q: adding VLAN 0 to HW filter on device team0 [ 1329.733388][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1329.741721][T19395] bridge0: port 1(bridge_slave_0) entered blocking state [ 1329.748764][T19395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1329.759932][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1329.768343][ T7869] bridge0: port 2(bridge_slave_1) entered blocking state [ 1329.775360][ T7869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1329.792137][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1329.800994][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1329.812277][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1329.823867][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1329.835278][T22030] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1329.846493][T22030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1329.854757][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1329.869632][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1329.877188][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1329.889064][T22030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1329.996272][T22040] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1331.069163][ T23] device bridge_slave_1 left promiscuous mode [ 1331.075360][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 1331.129224][ T23] device bridge_slave_0 left promiscuous mode [ 1331.135501][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 1331.858436][ T23] device hsr_slave_0 left promiscuous mode [ 1331.928407][ T23] device hsr_slave_1 left promiscuous mode [ 1331.975296][ T23] team0 (unregistering): Port device team_slave_1 removed [ 1331.986038][ T23] team0 (unregistering): Port device team_slave_0 removed [ 1331.996054][ T23] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1332.041742][ T23] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1332.098887][ T23] bond0 (unregistering): Released all slaves 07:15:52 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x40046109, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x40046109, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) close(r0) 07:15:52 executing program 1: semop(0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r5, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000025c0), 0x4) open(0x0, 0x0, 0x0) 07:15:52 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:52 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x0, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1332.271979][T22046] devpts: called with bogus options [ 1332.280160][ T26] audit: type=1800 audit(1574493352.920:2178): pid=22044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16785 res=0 [ 1332.328301][ T26] audit: type=1800 audit(1574493352.940:2179): pid=22049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16770 res=0 [ 1332.370851][ T26] audit: type=1804 audit(1574493352.940:2180): pid=22044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/600/file0" dev="sda1" ino=16785 res=1 [ 1332.454577][ T26] audit: type=1804 audit(1574493352.940:2181): pid=22049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/420/file0" dev="sda1" ino=16770 res=1 [ 1333.059932][T22053] devpts: called with bogus options 07:15:53 executing program 1: semop(0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r5, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000025c0), 0x4) open(0x0, 0x0, 0x0) 07:15:53 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1333.326384][T22062] devpts: called with bogus options [ 1333.411104][ T26] audit: type=1800 audit(1574493354.050:2182): pid=22066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16826 res=0 [ 1333.490672][ T26] audit: type=1804 audit(1574493354.100:2183): pid=22069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/421/file0" dev="sda1" ino=16826 res=1 [ 1334.814074][T22075] IPVS: ftp: loaded support on port[0] = 21 [ 1334.864975][T22075] chnl_net:caif_netlink_parms(): no params data found [ 1334.890808][T22075] bridge0: port 1(bridge_slave_0) entered blocking state [ 1334.897857][T22075] bridge0: port 1(bridge_slave_0) entered disabled state [ 1334.905733][T22075] device bridge_slave_0 entered promiscuous mode [ 1334.913108][T22075] bridge0: port 2(bridge_slave_1) entered blocking state [ 1334.920182][T22075] bridge0: port 2(bridge_slave_1) entered disabled state [ 1334.927832][T22075] device bridge_slave_1 entered promiscuous mode [ 1334.944808][T22075] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1334.955411][T22075] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1334.973870][T22075] team0: Port device team_slave_0 added [ 1334.980496][T22075] team0: Port device team_slave_1 added [ 1335.040660][T22075] device hsr_slave_0 entered promiscuous mode [ 1335.101034][T22075] device hsr_slave_1 entered promiscuous mode [ 1335.158302][T22075] debugfs: Directory 'hsr0' with parent '/' already present! [ 1335.172685][T22075] bridge0: port 2(bridge_slave_1) entered blocking state [ 1335.179777][T22075] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1335.187037][T22075] bridge0: port 1(bridge_slave_0) entered blocking state [ 1335.194066][T22075] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1335.222689][T22075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1335.233557][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1335.242170][ T7869] bridge0: port 1(bridge_slave_0) entered disabled state [ 1335.249996][ T7869] bridge0: port 2(bridge_slave_1) entered disabled state [ 1335.258797][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1335.270794][T22075] 8021q: adding VLAN 0 to HW filter on device team0 [ 1335.282242][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1335.290555][T20467] bridge0: port 1(bridge_slave_0) entered blocking state [ 1335.297572][T20467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1335.308500][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1335.316775][ T7869] bridge0: port 2(bridge_slave_1) entered blocking state [ 1335.323807][ T7869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1335.339850][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1335.348978][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1335.364388][T22075] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1335.374964][T22075] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1335.388100][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1335.396839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1335.405368][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1335.414471][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1335.429953][T22075] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1335.437520][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1335.445619][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1335.586570][T22084] rtc_cmos 00:00: Alarms can be up to one day in the future 07:15:59 executing program 5: semget(0x1, 0x0, 0x6d1) 07:15:59 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x0, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x2d2) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:15:59 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:15:59 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1338.446290][ T26] audit: type=1800 audit(1574493359.080:2184): pid=22097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16578 res=0 [ 1338.469641][ T26] audit: type=1800 audit(1574493359.080:2185): pid=22098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16562 res=0 [ 1338.493836][ T26] audit: type=1804 audit(1574493359.080:2186): pid=22098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/422/file0" dev="sda1" ino=16562 res=1 [ 1338.519958][ T26] audit: type=1804 audit(1574493359.080:2187): pid=22097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/601/file0" dev="sda1" ino=16578 res=1 [ 1338.560799][T22102] rtc_cmos 00:00: Alarms can be up to one day in the future 07:16:14 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x2c, 0x0, &(0x7f0000000140)=[@acquire={0x40046304}, @request_death, @register_looper, @clear_death], 0x3, 0x20000000, 0x0}) 07:16:14 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:16:14 executing program 1: ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000180), 0xfeed, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000900)=""/4096, 0xfd42, 0x0, 0x0, 0x112) 07:16:14 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:14 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/16, 0x10}], 0x1}}], 0x1, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000180)=""/172, 0xac, 0x0, &(0x7f0000000080)) readv(r0, &(0x7f0000000080), 0x200000000000029c) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0xfffffe82) 07:16:14 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x0, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1353.750866][ T26] audit: type=1800 audit(1574493374.390:2188): pid=22120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16657 res=0 07:16:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) fallocate(r2, 0x100000003, 0x804000, 0x28120001) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000002680)={'syz1', "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"}, 0xd84) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r6, &(0x7f0000000280)=""/135, 0x74f) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) fallocate(r5, 0x0, 0x0, 0x8020001) socket$inet6(0xa, 0x1, 0x0) [ 1353.780898][ T26] audit: type=1804 audit(1574493374.390:2189): pid=22120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/423/file0" dev="sda1" ino=16657 res=1 [ 1353.812683][ T26] audit: type=1800 audit(1574493374.390:2190): pid=22122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16721 res=0 [ 1353.843473][T22117] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1353.851705][ T26] audit: type=1804 audit(1574493374.410:2191): pid=22122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/602/file0" dev="sda1" ino=16721 res=1 07:16:14 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:16:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) sendmsg$netlink(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, r2}}}], 0x20}, 0x0) [ 1354.006646][T22138] rtc_cmos 00:00: Alarms can be up to one day in the future 07:16:14 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:16:14 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1354.214074][T22147] input: syz0 as /devices/virtual/input/input16 [ 1354.230367][T22149] rtc_cmos 00:00: Alarms can be up to one day in the future 07:16:14 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1354.454961][T22155] rtc_cmos 00:00: Alarms can be up to one day in the future 07:16:23 executing program 2: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:23 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:23 executing program 5: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x0, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:23 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:16:23 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:23 executing program 1: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x0, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1363.015699][ T26] audit: type=1800 audit(1574493383.650:2192): pid=22168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16643 res=0 [ 1363.052782][ T26] audit: type=1804 audit(1574493383.650:2193): pid=22168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/603/file0" dev="sda1" ino=16643 res=1 [ 1363.095048][ T26] audit: type=1800 audit(1574493383.650:2194): pid=22169 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16646 res=0 [ 1363.102580][T22166] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1363.117556][ T26] audit: type=1804 audit(1574493383.650:2195): pid=22169 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/424/file0" dev="sda1" ino=16646 res=1 07:16:23 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1363.151221][ T26] audit: type=1800 audit(1574493383.680:2196): pid=22164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16647 res=0 [ 1363.172344][ T26] audit: type=1804 audit(1574493383.680:2197): pid=22164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir253811555/syzkaller.KDWU6Q/846/file0" dev="sda1" ino=16647 res=1 07:16:24 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:16:24 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:16:24 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:24 executing program 1: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x0, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:24 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1364.192772][ T26] audit: type=1800 audit(1574493384.830:2198): pid=22181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16546 res=0 [ 1364.254093][ T26] audit: type=1804 audit(1574493384.830:2199): pid=22181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/604/file0" dev="sda1" ino=16546 res=1 [ 1364.315486][ T26] audit: type=1800 audit(1574493384.880:2200): pid=22180 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16636 res=0 [ 1364.357309][ T26] audit: type=1800 audit(1574493384.890:2201): pid=22182 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16638 res=0 [ 1365.399158][ T7755] device bridge_slave_1 left promiscuous mode [ 1365.405445][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1365.469232][ T7755] device bridge_slave_0 left promiscuous mode [ 1365.475377][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1366.148554][ T7755] device hsr_slave_0 left promiscuous mode [ 1366.198312][ T7755] device hsr_slave_1 left promiscuous mode [ 1366.244300][ T7755] team0 (unregistering): Port device team_slave_1 removed [ 1366.254947][ T7755] team0 (unregistering): Port device team_slave_0 removed [ 1366.264782][ T7755] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1366.314653][ T7755] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1366.388332][ T7755] bond0 (unregistering): Released all slaves [ 1366.475614][T22193] IPVS: ftp: loaded support on port[0] = 21 [ 1366.526503][T22193] chnl_net:caif_netlink_parms(): no params data found [ 1366.551988][T22193] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.559176][T22193] bridge0: port 1(bridge_slave_0) entered disabled state [ 1366.566997][T22193] device bridge_slave_0 entered promiscuous mode [ 1366.574625][T22193] bridge0: port 2(bridge_slave_1) entered blocking state [ 1366.581784][T22193] bridge0: port 2(bridge_slave_1) entered disabled state [ 1366.589773][T22193] device bridge_slave_1 entered promiscuous mode [ 1366.663225][T22193] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1366.676531][T22193] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1366.699403][T22193] team0: Port device team_slave_0 added [ 1366.706177][T22193] team0: Port device team_slave_1 added [ 1366.773258][T22193] device hsr_slave_0 entered promiscuous mode [ 1366.851629][T22193] device hsr_slave_1 entered promiscuous mode [ 1366.898343][T22193] debugfs: Directory 'hsr0' with parent '/' already present! [ 1366.916151][T22193] bridge0: port 2(bridge_slave_1) entered blocking state [ 1366.923274][T22193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1366.930531][T22193] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.937728][T22193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1366.976240][T22193] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1366.992505][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1367.003921][T19395] bridge0: port 1(bridge_slave_0) entered disabled state [ 1367.012423][T19395] bridge0: port 2(bridge_slave_1) entered disabled state [ 1367.025055][T22193] 8021q: adding VLAN 0 to HW filter on device team0 [ 1367.035422][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1367.044195][ T7647] bridge0: port 1(bridge_slave_0) entered blocking state [ 1367.051252][ T7647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1367.067868][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1367.076271][ T7869] bridge0: port 2(bridge_slave_1) entered blocking state [ 1367.083386][ T7869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1367.101853][T22193] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1367.112416][T22193] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1367.125267][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1367.134112][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1367.144183][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1367.153667][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1367.161929][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1367.169562][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1367.185142][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1367.192749][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1367.202939][T22193] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1367.345209][T22203] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1368.358824][ T7755] device bridge_slave_1 left promiscuous mode [ 1368.365054][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1368.419470][ T7755] device bridge_slave_0 left promiscuous mode [ 1368.425673][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.108596][ T7755] device hsr_slave_0 left promiscuous mode [ 1369.148464][ T7755] device hsr_slave_1 left promiscuous mode [ 1369.235838][ T7755] team0 (unregistering): Port device team_slave_1 removed [ 1369.246010][ T7755] team0 (unregistering): Port device team_slave_0 removed [ 1369.256128][ T7755] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1369.312316][ T7755] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1369.379707][ T7755] bond0 (unregistering): Released all slaves 07:16:34 executing program 2: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:39 executing program 5: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x0, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:39 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:39 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:39 executing program 1: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x0, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) [ 1378.510259][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 1378.510278][ T26] audit: type=1800 audit(1574493399.150:2204): pid=22211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16657 res=0 [ 1378.539635][ T26] audit: type=1804 audit(1574493399.150:2205): pid=22211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/426/file0" dev="sda1" ino=16657 res=1 [ 1378.568316][ T26] audit: type=1800 audit(1574493399.160:2206): pid=22213 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16661 res=0 [ 1378.593633][ T26] audit: type=1804 audit(1574493399.190:2207): pid=22213 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir253811555/syzkaller.KDWU6Q/848/file0" dev="sda1" ino=16661 res=1 [ 1378.625090][ T26] audit: type=1800 audit(1574493399.230:2208): pid=22214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16525 res=0 [ 1378.650441][ T26] audit: type=1804 audit(1574493399.240:2209): pid=22214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/605/file0" dev="sda1" ino=16525 res=1 07:16:40 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:40 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:40 executing program 2: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1379.584094][ T26] audit: type=1800 audit(1574493400.220:2210): pid=22223 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16627 res=0 07:16:40 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) gettid() open(0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) [ 1379.635434][ T26] audit: type=1800 audit(1574493400.220:2211): pid=22224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16649 res=0 [ 1379.688280][ T26] audit: type=1804 audit(1574493400.250:2212): pid=22223 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/427/file0" dev="sda1" ino=16627 res=1 [ 1379.733152][ T26] audit: type=1804 audit(1574493400.250:2213): pid=22224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/606/file0" dev="sda1" ino=16649 res=1 07:16:40 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r1, &(0x7f0000000500)={&(0x7f0000000280)=@nameseq={0x1e, 0x7}, 0x10, 0x0}, 0x0) 07:16:40 executing program 1: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {0x0, 0x100000}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x2128}) getegid() 07:16:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket(0x2, 0x803, 0xff) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, 0x0, &(0x7f0000000140)) r6 = dup2(r0, r2) dup3(r6, r1, 0x0) [ 1381.505980][T22253] IPVS: ftp: loaded support on port[0] = 21 [ 1381.556118][T22253] chnl_net:caif_netlink_parms(): no params data found [ 1381.582297][T22253] bridge0: port 1(bridge_slave_0) entered blocking state [ 1381.589481][T22253] bridge0: port 1(bridge_slave_0) entered disabled state [ 1381.597152][T22253] device bridge_slave_0 entered promiscuous mode [ 1381.604699][T22253] bridge0: port 2(bridge_slave_1) entered blocking state [ 1381.611798][T22253] bridge0: port 2(bridge_slave_1) entered disabled state [ 1381.620155][T22253] device bridge_slave_1 entered promiscuous mode [ 1381.637386][T22253] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1381.648140][T22253] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1381.666187][T22253] team0: Port device team_slave_0 added [ 1381.673024][T22253] team0: Port device team_slave_1 added [ 1381.741061][T22253] device hsr_slave_0 entered promiscuous mode [ 1381.778794][T22253] device hsr_slave_1 entered promiscuous mode [ 1381.828376][T22253] debugfs: Directory 'hsr0' with parent '/' already present! [ 1381.842201][T22253] bridge0: port 2(bridge_slave_1) entered blocking state [ 1381.849311][T22253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1381.856522][T22253] bridge0: port 1(bridge_slave_0) entered blocking state [ 1381.863554][T22253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1381.892522][T22253] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1381.903680][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1381.912260][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1381.920160][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1381.928577][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1381.939627][T22253] 8021q: adding VLAN 0 to HW filter on device team0 [ 1381.949553][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1381.958009][T19914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1381.965082][T19914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1381.975306][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1381.983585][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1381.990614][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1382.010925][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1382.019969][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1382.029070][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1382.039773][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1382.051242][T22253] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1382.062715][T22253] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1382.070600][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1382.086967][T22253] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1382.094885][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1382.102667][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1382.223739][T22263] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1383.208842][ T8002] device bridge_slave_1 left promiscuous mode [ 1383.215012][ T8002] bridge0: port 2(bridge_slave_1) entered disabled state [ 1383.279026][ T8002] device bridge_slave_0 left promiscuous mode [ 1383.285238][ T8002] bridge0: port 1(bridge_slave_0) entered disabled state [ 1383.978477][ T8002] device hsr_slave_0 left promiscuous mode [ 1384.018323][ T8002] device hsr_slave_1 left promiscuous mode [ 1384.094744][ T8002] team0 (unregistering): Port device team_slave_1 removed [ 1384.104697][ T8002] team0 (unregistering): Port device team_slave_0 removed [ 1384.114894][ T8002] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1384.152087][ T8002] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1384.259412][ T8002] bond0 (unregistering): Released all slaves 07:16:52 executing program 5: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x0, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:52 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:52 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:16:52 executing program 1: creat(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x5208, 0x0) 07:16:52 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet(0x10, 0x0, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r2 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) request_key(0x0, &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000200)='syz', r2) add_key$user(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000100), 0x0, r2) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x21}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x79380dd) [ 1392.000670][ T26] audit: type=1800 audit(1574493412.640:2214): pid=22275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16665 res=0 07:16:52 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004840)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000000)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) [ 1392.073404][ T26] audit: type=1804 audit(1574493412.640:2216): pid=22275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/607/file0" dev="sda1" ino=16665 res=1 [ 1392.173897][ T26] audit: type=1800 audit(1574493412.640:2215): pid=22274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16667 res=0 [ 1392.235475][ T26] audit: type=1804 audit(1574493412.650:2217): pid=22274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/428/file0" dev="sda1" ino=16667 res=1 07:16:53 executing program 1: 07:16:53 executing program 1: 07:16:53 executing program 1: 07:16:53 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:53 executing program 1: [ 1392.942740][ T26] audit: type=1800 audit(1574493413.580:2218): pid=22291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16593 res=0 [ 1393.048349][ T26] audit: type=1804 audit(1574493413.610:2219): pid=22291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/429/file0" dev="sda1" ino=16593 res=1 [ 1394.070441][ T26] audit: type=1800 audit(1574493414.710:2220): pid=22299 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16577 res=0 [ 1394.422349][T22304] IPVS: ftp: loaded support on port[0] = 21 [ 1394.472725][T22304] chnl_net:caif_netlink_parms(): no params data found [ 1394.498420][T22304] bridge0: port 1(bridge_slave_0) entered blocking state [ 1394.505489][T22304] bridge0: port 1(bridge_slave_0) entered disabled state [ 1394.513422][T22304] device bridge_slave_0 entered promiscuous mode [ 1394.520997][T22304] bridge0: port 2(bridge_slave_1) entered blocking state [ 1394.528028][T22304] bridge0: port 2(bridge_slave_1) entered disabled state [ 1394.535794][T22304] device bridge_slave_1 entered promiscuous mode [ 1394.553671][T22304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1394.564528][T22304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1394.582808][T22304] team0: Port device team_slave_0 added [ 1394.589455][T22304] team0: Port device team_slave_1 added [ 1394.670665][T22304] device hsr_slave_0 entered promiscuous mode [ 1394.718674][T22304] device hsr_slave_1 entered promiscuous mode [ 1394.758302][T22304] debugfs: Directory 'hsr0' with parent '/' already present! [ 1394.772108][T22304] bridge0: port 2(bridge_slave_1) entered blocking state [ 1394.779172][T22304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1394.786630][T22304] bridge0: port 1(bridge_slave_0) entered blocking state [ 1394.793782][T22304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1394.822642][T22304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1394.834172][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1394.842707][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1394.850830][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1394.859799][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1394.870916][T22304] 8021q: adding VLAN 0 to HW filter on device team0 [ 1394.881455][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1394.889982][T19914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1394.897058][T19914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1394.910302][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1394.918769][ T7869] bridge0: port 2(bridge_slave_1) entered blocking state [ 1394.925785][ T7869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1394.939825][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1394.948953][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1394.964350][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1394.973244][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1394.981442][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1394.991078][T22304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1395.005326][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1395.012785][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1395.023121][T22304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1395.155229][T22316] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1396.138898][ T23] device bridge_slave_1 left promiscuous mode [ 1396.145063][ T23] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.198828][ T23] device bridge_slave_0 left promiscuous mode [ 1396.205023][ T23] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.898582][ T23] device hsr_slave_0 left promiscuous mode [ 1396.948342][ T23] device hsr_slave_1 left promiscuous mode [ 1397.005077][ T23] team0 (unregistering): Port device team_slave_1 removed [ 1397.015595][ T23] team0 (unregistering): Port device team_slave_0 removed [ 1397.025966][ T23] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1397.071571][ T23] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1397.139018][ T23] bond0 (unregistering): Released all slaves 07:16:59 executing program 5: 07:16:59 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:59 executing program 1: 07:16:59 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:16:59 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:16:59 executing program 2: [ 1399.187254][ T26] audit: type=1800 audit(1574493419.820:2221): pid=22322 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16521 res=0 [ 1399.246329][ T26] audit: type=1800 audit(1574493419.850:2222): pid=22325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16536 res=0 07:16:59 executing program 1: [ 1399.297495][ T26] audit: type=1804 audit(1574493419.850:2223): pid=22325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/430/file0" dev="sda1" ino=16536 res=1 [ 1399.379212][ T26] audit: type=1804 audit(1574493419.860:2224): pid=22322 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/608/file0" dev="sda1" ino=16521 res=1 07:17:00 executing program 1: 07:17:00 executing program 1: 07:17:00 executing program 1: 07:17:00 executing program 1: 07:17:00 executing program 1: [ 1401.460542][T22347] IPVS: ftp: loaded support on port[0] = 21 [ 1401.510645][T22347] chnl_net:caif_netlink_parms(): no params data found [ 1401.535126][T22347] bridge0: port 1(bridge_slave_0) entered blocking state [ 1401.542263][T22347] bridge0: port 1(bridge_slave_0) entered disabled state [ 1401.550118][T22347] device bridge_slave_0 entered promiscuous mode [ 1401.557408][T22347] bridge0: port 2(bridge_slave_1) entered blocking state [ 1401.564611][T22347] bridge0: port 2(bridge_slave_1) entered disabled state [ 1401.572500][T22347] device bridge_slave_1 entered promiscuous mode [ 1401.589235][T22347] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1401.599896][T22347] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1401.617663][T22347] team0: Port device team_slave_0 added [ 1401.624700][T22347] team0: Port device team_slave_1 added [ 1401.701007][T22347] device hsr_slave_0 entered promiscuous mode [ 1401.768563][T22347] device hsr_slave_1 entered promiscuous mode [ 1401.818370][T22347] debugfs: Directory 'hsr0' with parent '/' already present! [ 1401.832908][T22347] bridge0: port 2(bridge_slave_1) entered blocking state [ 1401.839976][T22347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1401.847305][T22347] bridge0: port 1(bridge_slave_0) entered blocking state [ 1401.854417][T22347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1401.883842][T22347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1401.894564][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1401.902877][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1401.911199][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1401.920155][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1401.931731][T22347] 8021q: adding VLAN 0 to HW filter on device team0 [ 1401.941895][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1401.950293][T19914] bridge0: port 1(bridge_slave_0) entered blocking state [ 1401.957301][T19914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1401.967364][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1401.976022][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 1401.983060][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1401.999601][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1402.008694][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1402.019731][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1402.035837][T22347] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1402.046480][T22347] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1402.058290][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1402.066809][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1402.075327][T19914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1402.089366][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1402.096787][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1402.107529][T22347] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1402.236024][T22357] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1403.399133][T19966] device bridge_slave_1 left promiscuous mode [ 1403.405343][T19966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1403.439101][T19966] device bridge_slave_0 left promiscuous mode [ 1403.445474][T19966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1404.118723][T19966] device hsr_slave_0 left promiscuous mode [ 1404.158417][T19966] device hsr_slave_1 left promiscuous mode [ 1404.205096][T19966] team0 (unregistering): Port device team_slave_1 removed [ 1404.215145][T19966] team0 (unregistering): Port device team_slave_0 removed [ 1404.225236][T19966] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1404.281904][T19966] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1404.348912][T19966] bond0 (unregistering): Released all slaves 07:17:08 executing program 5: 07:17:08 executing program 1: 07:17:08 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="02120000020000000a24c37bca08bb6f9ac77b52c0e002d44fb9cd09fed421605eccb6ca0b82d5efa49700744db91caf21accf8c230699da767dbf56ce3e22d338e8e963b7724d3569a6bd3116332cd00f5b10de650ba76c8739f3e1b49dc83c314195492c28f6ac6e810939b7626bf2ed434c17f64d5d50b1da8db0302efd67857d5ce9067f5158eb01b1b8449cf302d5010a8e9b23f627872e58bc714c64d56d080b9932a5674f50c5775229dcf048e61a4d53595f4201b50b626de9fa03ba88407db7e4f471eadc38bdb1d71039afa51a2717139ae76675ad676622f876cbdbbfd0598367a55cb01b708656f04c26345a45b7864db617a0496db743a71f7c9010c6c77a6f2f6a7479fa68e5a40ac8d1dc11b69a958683b70db1cc5d3384cf16435508f2905a583959f241c90d8b17a31e58f72027c54bd13970398397a822d2b3c6a168fc06c9136be092f06ee8140700000000000000923f5959127d542d46887a248cff5d55862dcda283ba3ce8c53789ce39cb77640ed39cc1b8497e6ccd55c27034b82df986185a562e7cc0043eb1ee5468a2a8d2b255eadc7b860b179aa90378c8a1c1448cea4d7d0aeb49e4ed5dd3082a0d16c81052e42e93cceb7ff2afe37a51170387a3d962a2d5314b0e9e1149e46c6fe27804a5d8e0e166051d67cee1e0dcba3000cdd2212450c85264441d7bec6517b0d6b9e2dd84c99702bc35a8ab8a77e36f64485d09f7ac2b550f72cce05abbefe39989e8f2bbdbde4e1a2829496a1ba056417391bf8c21f2fa8592bd01ea3d642c9e859cff31626ef5cd3859ed294c7c5272e6a89857fd7b99b7d19e4df36522899818a85124f7f2039f222f02c3c88a8453cb7d97985fa9177c5fe0a134a885d04d5777e5cc4b9e5abeb8f40bf45927287145366224e47abd5fc4048e1e2325d5e5a74a43567d94c99dfcfba2cde3b1dc66f49af301bfd49cf6742d8650b08174c5cde04435538aedee12777f6dad1f6ba0f4939ae1c4c7563c93f39e26ad4dddede0bbacf3937fe7b2eb83bbfb357378794bfa6ac86660ae8c52b1ae6740233ef68d00b841731d152440f6ed6679661cf519186836ca5d3da7f39ea6f1b941f490afb5aea21c9ecfb1dac8d30b3a7ea399e84d9c80812dfc8d588026fd224587b919bdbe0a48c539eb76c815cc73551a91f145fe87aac1789207acef1ba4b874eb3e1b922e7ff7074dfe288125930fa5185cb2f11b716924dd69d138513b5eb4f56bdb88957a5ba85a9448cc"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) recvmmsg(r2, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:17:08 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:17:08 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[]}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:17:08 executing program 2: [ 1407.513928][ T26] audit: type=1800 audit(1574493428.150:2225): pid=22366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16522 res=0 [ 1407.568630][ T26] audit: type=1804 audit(1574493428.150:2226): pid=22366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/431/file0" dev="sda1" ino=16522 res=1 07:17:08 executing program 1: [ 1407.671573][ T26] audit: type=1800 audit(1574493428.180:2227): pid=22365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16548 res=0 [ 1407.720872][ T26] audit: type=1804 audit(1574493428.190:2228): pid=22365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/609/file0" dev="sda1" ino=16548 res=1 07:17:08 executing program 1: 07:17:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x91) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0xfffffffd, 0x3, 0x7}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 07:17:09 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[]}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:17:09 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) recvmmsg(r2, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) [ 1408.535860][ T26] audit: type=1800 audit(1574493429.170:2229): pid=22381 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16521 res=0 [ 1408.584501][ T26] audit: type=1804 audit(1574493429.200:2230): pid=22381 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir580683794/syzkaller.48I37D/432/file0" dev="sda1" ino=16521 res=1 [ 1408.702636][ T26] audit: type=1800 audit(1574493429.240:2231): pid=22384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16643 res=0 [ 1408.726701][ T26] audit: type=1804 audit(1574493429.240:2232): pid=22384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir835804945/syzkaller.SDebZk/610/file0" dev="sda1" ino=16643 res=1 07:17:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x91) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0xfffffffd, 0x3, 0x7}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 1409.990663][T22400] IPVS: ftp: loaded support on port[0] = 21 [ 1410.042798][T22400] chnl_net:caif_netlink_parms(): no params data found [ 1410.069095][T22400] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.076152][T22400] bridge0: port 1(bridge_slave_0) entered disabled state [ 1410.083922][T22400] device bridge_slave_0 entered promiscuous mode [ 1410.091303][T22400] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.098383][T22400] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.106021][T22400] device bridge_slave_1 entered promiscuous mode [ 1410.123234][T22400] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1410.133913][T22400] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1410.152234][T22400] team0: Port device team_slave_0 added [ 1410.159018][T22400] team0: Port device team_slave_1 added [ 1410.210859][T22400] device hsr_slave_0 entered promiscuous mode [ 1410.248753][T22400] device hsr_slave_1 entered promiscuous mode [ 1410.308388][T22400] debugfs: Directory 'hsr0' with parent '/' already present! [ 1410.322480][T22400] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.329540][T22400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1410.336755][T22400] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.343801][T22400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1410.372135][T22400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1410.383323][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1410.391642][ T7647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1410.399711][ T7647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1410.408458][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1410.419796][T22400] 8021q: adding VLAN 0 to HW filter on device team0 [ 1410.430577][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1410.438964][ T7869] bridge0: port 1(bridge_slave_0) entered blocking state [ 1410.446006][ T7869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1410.456459][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1410.464862][T19395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1410.471997][T19395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1410.491374][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1410.500198][T20467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1410.513522][T22400] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1410.524216][T22400] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1410.536742][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1410.544983][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1410.553738][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1410.563046][T19395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1410.575841][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1410.583684][ T7869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1410.594199][T22400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1410.718700][T22410] rtc_cmos 00:00: Alarms can be up to one day in the future [ 1411.700010][T19966] device bridge_slave_1 left promiscuous mode [ 1411.706169][T19966] bridge0: port 2(bridge_slave_1) entered disabled state [ 1411.769224][T19966] device bridge_slave_0 left promiscuous mode [ 1411.775363][T19966] bridge0: port 1(bridge_slave_0) entered disabled state [ 1412.448372][T19966] device hsr_slave_0 left promiscuous mode [ 1412.538341][T19966] device hsr_slave_1 left promiscuous mode [ 1412.584995][T19966] team0 (unregistering): Port device team_slave_1 removed [ 1412.595394][T19966] team0 (unregistering): Port device team_slave_0 removed [ 1412.605310][T19966] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1412.651648][T19966] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1412.730068][T19966] bond0 (unregistering): Released all slaves 07:17:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000200)=""/124, 0x7c}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x5e36, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x10000000005, 0x84) readv(r2, &(0x7f00000019c0)=[{&(0x7f00000008c0)=""/4096, 0x1000}], 0x1) shutdown(r1, 0x0) 07:17:16 executing program 1: socket$inet6(0xa, 0x3, 0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0xb20, @rand_addr="4662dabaa42073a715bed7a606cda486"}, 0x1c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x200, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x1cef186342d822a5, 0xffffffffffffffff) r1 = getuid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x7000000, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x5}}]}}) 07:17:16 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r1, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) request_key(0x0, 0x0, &(0x7f00000006c0)='user\x00', 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x0, 0x80}}) 07:17:16 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(r2, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4, 0x1}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[]}}, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) recvmmsg(r3, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:17:16 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x373199218b66a31e) ioctl(0xffffffffffffffff, 0x1, &(0x7f00000014c0)) socket(0x200000000000011, 0x3, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket(0x9, 0x82a34279171a3203, 0x7d) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getegid() setresgid(0x0, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000000)) gettid() write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000f00)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x83, 0x9, 0x7, 0x6ecf, 0x2, 0x6, 0x80000001, 0x3e6, 0x40, 0x1e7, 0x4000, 0x0, 0x38, 0x2, 0x3ff, 0x3f, 0x1000}, [{0x6474e551, 0x80000001, 0x5, 0x1f, 0x1, 0x1, 0x4}, {0x2, 0x9, 0xb319, 0x3, 0x7fffffff, 0x7, 0x1f, 0x7fffffff}], "795cb5bc6dc253d1a945bcba405660b2be7ded846d928b6403605c105eeccda7a9dff22ddda51757057895dc1abdf507a212d69890fa1b5d69407bde8ae7a5ede091ce3143d21d505839ca838a2dd1ee629082fa14f6d459431b0efba1b4900973cf5fdcb6091c44d81208d6b7bc67c67112cd5b8345a142d7170fcc5fa574714ac1", [[], [], [], [], [], [], []]}, 0x832) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000340)=0x80, 0x80800) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r2) recvmmsg(r2, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffef7}}, {{0x0, 0x0, 0x0, 0x2f2, 0x0, 0x1e3}}, {{0x0, 0x0, 0x0, 0xffffff4d}}], 0x3, 0x0, 0x0) sendfile(r0, r1, 0x0, 0xfffc) socket(0x11, 0x800000003, 0x0) 07:17:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg(r3, &(0x7f000000cb80)=[{{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000000400)="a1", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[{0x18, 0x0, 0x0, '\r'}], 0x18}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) [ 1415.833430][T19966] ================================================================== [ 1415.841597][T19966] BUG: KCSAN: data-race in percpu_counter_add_batch / wb_over_bg_thresh [ 1415.849917][T19966] [ 1415.852263][T19966] write to 0xffff8881299668e0 of 8 bytes by task 22418 on cpu 0: [ 1415.859991][T19966] percpu_counter_add_batch+0xca/0x150 [ 1415.865457][T19966] account_page_dirtied+0x1f7/0x4a0 [ 1415.870663][T19966] __set_page_dirty+0x8a/0x270 [ 1415.875525][T19966] mark_buffer_dirty+0x27f/0x2c0 [ 1415.880483][T19966] __ext4_handle_dirty_metadata+0x284/0x350 [ 1415.886384][T19966] ext4_mark_iloc_dirty+0xdb3/0x1580 [ 1415.891805][T19966] ext4_mark_inode_dirty+0xe9/0x420 [ 1415.897214][T19966] ext4_ext_tree_init+0x92/0xb0 [ 1415.902080][T19966] __ext4_new_inode+0x2c29/0x2ec0 [ 1415.907130][T19966] ext4_symlink+0x30e/0x970 [ 1415.911647][T19966] vfs_symlink+0x218/0x310 [ 1415.916079][T19966] do_symlinkat+0x1a5/0x1e0 [ 1415.920600][T19966] __x64_sys_symlink+0x3f/0x50 [ 1415.925376][T19966] do_syscall_64+0xcc/0x370 [ 1415.929983][T19966] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1415.935882][T19966] [ 1415.938230][T19966] read to 0xffff8881299668e0 of 8 bytes by task 19966 on cpu 1: [ 1415.945876][T19966] wb_over_bg_thresh+0x247/0x490 [ 1415.950830][T19966] wb_workfn+0x3b3/0x970 [ 1415.955236][T19966] process_one_work+0x3d4/0x890 [ 1415.960101][T19966] worker_thread+0xa0/0x800 [ 1415.964615][T19966] kthread+0x1d4/0x200 [ 1415.968708][T19966] ret_from_fork+0x1f/0x30 [ 1415.973119][T19966] [ 1415.975444][T19966] Reported by Kernel Concurrency Sanitizer on: [ 1415.981604][T19966] CPU: 1 PID: 19966 Comm: kworker/u4:0 Not tainted 5.4.0-rc7+ #0 [ 1415.989429][T19966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1415.999498][T19966] Workqueue: writeback wb_workfn (flush-8:0) [ 1416.005475][T19966] ================================================================== [ 1416.013615][T19966] Kernel panic - not syncing: panic_on_warn set ... [ 1416.020246][T19966] CPU: 1 PID: 19966 Comm: kworker/u4:0 Not tainted 5.4.0-rc7+ #0 [ 1416.027955][T19966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1416.038020][T19966] Workqueue: writeback wb_workfn (flush-8:0) [ 1416.043996][T19966] Call Trace: [ 1416.047296][T19966] dump_stack+0x11d/0x181 [ 1416.051627][T19966] panic+0x210/0x640 [ 1416.055527][T19966] ? vprintk_func+0x8d/0x140 [ 1416.060124][T19966] kcsan_report.cold+0xc/0xd [ 1416.064744][T19966] kcsan_setup_watchpoint+0x3fe/0x460 [ 1416.070117][T19966] __tsan_read8+0xc6/0x100 [ 1416.074537][T19966] wb_over_bg_thresh+0x247/0x490 [ 1416.079476][T19966] ? blk_flush_plug_list+0x27b/0x2a0 [ 1416.084783][T19966] wb_workfn+0x3b3/0x970 [ 1416.089038][T19966] process_one_work+0x3d4/0x890 [ 1416.093894][T19966] worker_thread+0xa0/0x800 [ 1416.098404][T19966] kthread+0x1d4/0x200 [ 1416.102475][T19966] ? rescuer_thread+0x6a0/0x6a0 [ 1416.107322][T19966] ? kthread_stop+0x2d0/0x2d0 [ 1416.112002][T19966] ret_from_fork+0x1f/0x30 [ 1416.118097][T19966] Kernel Offset: disabled [ 1416.122430][T19966] Rebooting in 86400 seconds..