, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 936.552869] audit: type=1800 audit(1547555467.888:1560): pid=25712 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16824 res=0 12:31:08 executing program 4: creat(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)='\xfd]md5sum[\x00') [ 936.844560] audit: type=1804 audit(1547555467.898:1561): pid=25712 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/214/file0" dev="sda1" ino=16824 res=1 [ 936.882820] input: syz0 as /devices/virtual/input/input19 [ 936.908465] input: failed to attach handler leds to device input19, error: -6 [ 936.928943] audit: type=1804 audit(1547555467.908:1562): pid=25711 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/526/file0" dev="sda1" ino=16761 res=1 12:31:08 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:08 executing program 4: creat(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)='\xfd]md5sum[\x00') [ 937.037181] input: syz0 as /devices/virtual/input/input20 [ 937.093471] input: failed to attach handler leds to device input20, error: -6 12:31:08 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbf) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{0xd616}]}, 0x14, 0x0) setresuid(r1, r1, 0x0) execve(0x0, 0x0, 0x0) 12:31:08 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 937.310179] audit: type=1800 audit(1547555468.828:1563): pid=25750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16820 res=0 [ 937.540687] audit: type=1804 audit(1547555468.878:1564): pid=25750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/527/file0" dev="sda1" ino=16820 res=1 12:31:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:09 executing program 3: r0 = socket$inet(0x2, 0x800001000000003, 0x84) sendto$inet(r0, &(0x7f0000000140)="e617ca8c55cdedb17367fb348e185c21", 0x10, 0x800, 0x0, 0x0) 12:31:09 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbf) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{0xd616}]}, 0x14, 0x0) setresuid(r1, r1, 0x0) execve(0x0, 0x0, 0x0) 12:31:09 executing program 4: creat(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, 0x0) 12:31:09 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 938.096493] Error parsing options; rc = [-22] 12:31:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:09 executing program 3: r0 = socket$inet(0x2, 0x800001000000003, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x10) 12:31:09 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbf) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{0xd616}]}, 0x14, 0x0) setresuid(r1, r1, 0x0) execve(0x0, 0x0, 0x0) 12:31:09 executing program 4: creat(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, 0x0) [ 938.324376] Error parsing options; rc = [-22] 12:31:09 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:10 executing program 4: creat(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ecryptfs\x00', 0x0, 0x0) 12:31:10 executing program 3: r0 = socket$inet(0x2, 0x800001000000003, 0x84) sendto$inet(r0, &(0x7f0000000140)="e617ca8c55cdedb17367fb34", 0xc, 0x0, 0x0, 0x0) [ 938.718948] Error parsing options; rc = [-22] 12:31:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='teql0\x00') sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 12:31:10 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) unlink(&(0x7f0000000580)='./bus\x00') vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') syz_open_procfs(0x0, &(0x7f0000000140)='net/netlink\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x20) socket$inet(0x2, 0x4000000000000001, 0x0) clock_gettime(0x0, &(0x7f0000001240)) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:31:10 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) 12:31:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x0, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 939.584265] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 939.609635] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 939.631725] kauditd_printk_skb: 4 callbacks suppressed [ 939.631745] audit: type=1800 audit(1547555471.148:1569): pid=25819 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16857 res=0 12:31:11 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 939.723585] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 939.748070] audit: type=1804 audit(1547555471.188:1570): pid=25819 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/216/file0" dev="sda1" ino=16857 res=1 12:31:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) 12:31:11 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x10, 0x0, &(0x7f0000000040)=[@enter_looper, @register_looper, @increfs={0x40046304, 0x3}], 0x0, 0x0, 0x0}) [ 940.024326] audit: type=1800 audit(1547555471.228:1571): pid=25822 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16849 res=0 12:31:11 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 940.188532] binder: 25838:25839 ERROR: BC_REGISTER_LOOPER called after BC_ENTER_LOOPER [ 940.203122] binder: 25838:25839 IncRefs 0 refcount change on invalid ref 3 ret -22 [ 940.266129] audit: type=1804 audit(1547555471.258:1572): pid=25822 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/529/file0" dev="sda1" ino=16849 res=1 12:31:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) [ 940.437807] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 12:31:12 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 940.631479] net_ratelimit: 26 callbacks suppressed [ 940.631487] protocol 88fb is buggy, dev hsr_slave_0 [ 940.641630] protocol 88fb is buggy, dev hsr_slave_1 [ 940.646766] protocol 88fb is buggy, dev hsr_slave_0 [ 940.651882] protocol 88fb is buggy, dev hsr_slave_1 [ 940.657043] protocol 88fb is buggy, dev hsr_slave_0 [ 940.662169] protocol 88fb is buggy, dev hsr_slave_1 12:31:12 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ppp\x00', 0x0, 0x0) vmsplice(r0, &(0x7f00000014c0)=[{0x0}], 0x1, 0x0) [ 940.791927] protocol 88fb is buggy, dev hsr_slave_0 [ 940.797132] protocol 88fb is buggy, dev hsr_slave_1 12:31:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) 12:31:12 executing program 5: mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') socketpair(0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r0, 0x2008200) socket$inet(0x2, 0x0, 0x8) r1 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, &(0x7f00000002c0), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 12:31:12 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 941.112165] protocol 88fb is buggy, dev hsr_slave_0 [ 941.117790] protocol 88fb is buggy, dev hsr_slave_1 [ 941.244097] audit: type=1804 audit(1547555472.768:1573): pid=25873 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir341656010/syzkaller.k9YVXC/68/bus" dev="sda1" ino=16858 res=1 [ 941.395353] audit: type=1800 audit(1547555472.798:1574): pid=25873 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="bus" dev="sda1" ino=16858 res=0 [ 941.432637] audit: type=1804 audit(1547555472.848:1575): pid=25877 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir341656010/syzkaller.k9YVXC/68/bus" dev="sda1" ino=16858 res=1 [ 941.464687] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 941.480824] audit: type=1804 audit(1547555472.968:1576): pid=25873 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir341656010/syzkaller.k9YVXC/68/bus" dev="sda1" ino=16858 res=1 12:31:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000180)=""/69, 0x153}, {&(0x7f0000000100)=""/51, 0x33}], 0x2, 0x0) 12:31:13 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0x0, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:13 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 941.622233] audit: type=1804 audit(1547555473.148:1577): pid=25883 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir341656010/syzkaller.k9YVXC/68/bus" dev="sda1" ino=16858 res=1 12:31:13 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d880000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0000000"], 0x0) 12:31:13 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, 0x0, 0x0, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @dev={0xac, 0x14, 0x14, 0xd}}, 0xc) [ 941.888001] audit: type=1804 audit(1547555473.178:1578): pid=25870 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir341656010/syzkaller.k9YVXC/68/bus" dev="sda1" ino=16858 res=1 12:31:13 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:13 executing program 4: write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmsg(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000500)}], 0x1}, 0x0) close(r0) 12:31:13 executing program 5: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 12:31:13 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, 0x0, 0x0, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:13 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:14 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, 0x0, 0x0, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:14 executing program 4: write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmsg(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000500)}], 0x1}, 0x0) close(r0) 12:31:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0x0, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:14 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180), 0x0, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:14 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:14 executing program 5: sched_setaffinity(0x0, 0x63, &(0x7f0000000300)=0x9) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/mcfilter\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 12:31:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 12:31:14 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180), 0x0, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:14 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:15 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 12:31:15 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180), 0x0, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:15 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x1000002ac) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 12:31:15 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 12:31:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0x0, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:16 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:16 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{0x0}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 12:31:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:16 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{0x0}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:16 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) [ 944.718360] kauditd_printk_skb: 9 callbacks suppressed [ 944.718373] audit: type=1800 audit(1547555476.238:1588): pid=25993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=17101 res=0 12:31:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dummy0\x00', 0x43732e5398416f1a}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000140)) [ 944.791484] audit: type=1804 audit(1547555476.288:1589): pid=25993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/532/file0" dev="sda1" ino=17101 res=1 [ 944.850438] audit: type=1800 audit(1547555476.348:1590): pid=25996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16513 res=0 [ 944.948019] audit: type=1804 audit(1547555476.358:1591): pid=25996 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/219/file0" dev="sda1" ino=16513 res=1 12:31:17 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:17 executing program 4: ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 12:31:17 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 12:31:17 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{0x0}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 946.491583] loop5: p1 p2 p3 p4 < > 12:31:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x0, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:18 executing program 4: ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 12:31:18 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:18 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x0) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:18 executing program 4: ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) [ 946.685709] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 946.728478] audit: type=1800 audit(1547555478.248:1592): pid=26033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16514 res=0 [ 946.871471] net_ratelimit: 22 callbacks suppressed [ 946.871479] protocol 88fb is buggy, dev hsr_slave_0 [ 946.881559] protocol 88fb is buggy, dev hsr_slave_1 [ 946.885407] audit: type=1804 audit(1547555478.258:1593): pid=26033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/533/file0" dev="sda1" ino=16514 res=1 [ 946.886673] protocol 88fb is buggy, dev hsr_slave_0 12:31:18 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 946.916479] audit: type=1800 audit(1547555478.298:1594): pid=26037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16516 res=0 [ 946.918641] protocol 88fb is buggy, dev hsr_slave_1 [ 946.918737] protocol 88fb is buggy, dev hsr_slave_0 12:31:18 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000002840)=""/177, 0xb1}], 0x1, 0x0) [ 946.945288] audit: type=1804 audit(1547555478.328:1595): pid=26037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/220/file0" dev="sda1" ino=16516 res=1 [ 946.946442] protocol 88fb is buggy, dev hsr_slave_1 [ 947.031502] protocol 88fb is buggy, dev hsr_slave_0 [ 947.036663] protocol 88fb is buggy, dev hsr_slave_1 [ 947.088102] print_req_error: 7 callbacks suppressed [ 947.088117] print_req_error: I/O error, dev loop5, sector 201 flags 80700 [ 947.138260] print_req_error: I/O error, dev loop5, sector 201 flags 0 [ 947.145761] buffer_io_error: 6 callbacks suppressed [ 947.145771] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 947.160580] print_req_error: I/O error, dev loop5, sector 205 flags 0 [ 947.169244] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 947.177463] print_req_error: I/O error, dev loop5, sector 201 flags 0 [ 947.184743] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 947.194099] print_req_error: I/O error, dev loop5, sector 205 flags 0 [ 947.201899] Buffer I/O error on dev loop5p3, logical block 1, async page read 12:31:18 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) [ 947.237509] print_req_error: I/O error, dev loop5, sector 101 flags 80700 [ 947.246287] print_req_error: I/O error, dev loop5, sector 201 flags 0 [ 947.254619] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 947.263642] print_req_error: I/O error, dev loop5, sector 205 flags 0 [ 947.270864] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 947.279980] print_req_error: I/O error, dev loop5, sector 201 flags 0 12:31:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) [ 947.288291] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 947.297040] print_req_error: I/O error, dev loop5, sector 205 flags 0 [ 947.304524] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 947.313188] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 947.322237] Buffer I/O error on dev loop5p3, logical block 1, async page read [ 947.361477] protocol 88fb is buggy, dev hsr_slave_0 [ 947.366623] protocol 88fb is buggy, dev hsr_slave_1 12:31:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x86, &(0x7f0000000180), 0x142}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x5, &(0x7f00000001c0), 0x0, &(0x7f0000000600)}}], 0x253, 0x0) 12:31:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 12:31:20 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x10, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000280)={@link_local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 12:31:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 12:31:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x0, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:20 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) [ 948.794565] audit: type=1800 audit(1547555480.318:1596): pid=26094 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16514 res=0 12:31:20 executing program 5: timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000002c0)) timer_settime(0x0, 0x0, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 12:31:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) [ 949.018006] audit: type=1804 audit(1547555480.318:1597): pid=26094 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/221/file0" dev="sda1" ino=16514 res=1 12:31:20 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 12:31:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:31:21 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:21 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:21 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 12:31:21 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) fcntl$dupfd(r0, 0x406, r1) socket$bt_hidp(0x1f, 0x3, 0x6) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x4000, 0x0) socket$key(0xf, 0x3, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_FIOGETOWN(r2, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x100000003) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e6661", 0xa}], 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) fchdir(r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') r4 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x120) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x3, 0x8}}, 0x28) sendmmsg(r5, &(0x7f00000092c0), 0x800010b, 0x18) ioctl$KIOCSOUND(r3, 0x4b2f, 0x400) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000280)={0x7, 0x1e, 0x0, 0x1, 0x0, 0x6}) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000240)={0x4, 0x9, 0x0, 0x2}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000100), &(0x7f0000000200)=0xc) fcntl$getown(r1, 0x9) 12:31:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 950.222550] kauditd_printk_skb: 2 callbacks suppressed [ 950.222564] audit: type=1400 audit(1547555481.728:1600): avc: denied { ioctl } for pid=26126 comm="syz-executor5" path="socket:[87304]" dev="sockfs" ino=87304 ioctlcmd=0x8903 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 12:31:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 950.905248] audit: type=1800 audit(1547555482.428:1601): pid=26148 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16879 res=0 12:31:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x0, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @local}, 0xc) 12:31:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0xfffffffc, 0x4) listen(r0, 0x0) close(r0) 12:31:22 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) [ 950.949409] audit: type=1804 audit(1547555482.428:1602): pid=26148 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/535/file0" dev="sda1" ino=16879 res=1 12:31:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000981ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x7fffffff) epoll_pwait(r1, &(0x7f0000000200)=[{}], 0x1, 0x7fffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000984ff4)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000400)={0x20000006}) 12:31:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @local}, 0xc) 12:31:22 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) [ 951.281616] audit: type=1800 audit(1547555482.638:1603): pid=26162 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16870 res=0 12:31:22 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0x0) 12:31:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @local}, 0xc) [ 951.651562] audit: type=1804 audit(1547555482.678:1604): pid=26162 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/222/file0" dev="sda1" ino=16870 res=1 12:31:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0xfffffffc, 0x4) listen(r0, 0x0) [ 951.931560] audit: type=1400 audit(1547555482.978:1605): avc: denied { block_suspend } for pid=26168 comm="syz-executor5" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 12:31:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:24 executing program 2: mlockall(0x0) io_setup(0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) r2 = memfd_create(&(0x7f0000000240)='\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 12:31:24 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @local}, 0xc) 12:31:24 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0xffffffffffffffff) add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="d8f705be67f0483d18aeca53c1b984217d98ef0637d4306714c227409a4dd4be2c27ce394e2f7894f555d076286c3908e7a341183e980790c21c3b32ac3656f8957d6d28c5bb01aa1a75607a43304450041bea4887462c810ff5658173014e25a303a2bdd4787b3413f92c73744a03048139cb3a78cb4521081c27ddc4412f9500f82593c9c566e52348f4dd7cca67b27b1177cb2c85f57b0da4638a9359b2cfd4e47a1f7b6ddef9bdd6dc9f99531a85d67f0a11750594764b48ae9faddc6cb89d3c626842fa3e", 0xc7, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000000c0)) open$dir(0x0, 0x4000080004, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00', 0x1}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r6, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000200)) socket$inet(0x2, 0x5, 0x8) r7 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r6, r7, &(0x7f00000002c0), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[]}}, 0x0) 12:31:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 952.652580] audit: type=1800 audit(1547555484.168:1606): pid=26195 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16879 res=0 [ 952.749932] audit: type=1804 audit(1547555484.218:1607): pid=26195 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/536/file0" dev="sda1" ino=16879 res=1 12:31:24 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), 0x0) memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) tee(0xffffffffffffffff, r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x0) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) getsockname$inet6(r3, &(0x7f0000000300), 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local={0x12, 0x80, 0xc2, 0x0, 0xe000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000100)={[], 0xffffffff, 0x80000001, 0x10000, 0x0, 0x7fff}) perf_event_open(&(0x7f0000000800)={0x4003, 0x70, 0x8, 0x0, 0x9, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x80000000, 0x0, 0x7, 0x624, 0x80, 0x0, 0xfff, 0x0, 0x0, 0x7, 0x4, 0x0, 0x8, 0x80000001, 0x9, 0x0, 0x0, 0x2, 0x400, 0xffff, 0xa7, 0x0, 0xed, 0x100000000, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x7}, 0x482b, 0x9, 0xfff, 0x0, 0x6, 0x40}, 0x0, 0xc, r0, 0x1) [ 952.947768] device lo entered promiscuous mode 12:31:24 executing program 4: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @local}, 0xc) [ 953.121468] net_ratelimit: 26 callbacks suppressed [ 953.121476] protocol 88fb is buggy, dev hsr_slave_0 [ 953.131594] protocol 88fb is buggy, dev hsr_slave_1 [ 953.136704] protocol 88fb is buggy, dev hsr_slave_0 [ 953.141806] protocol 88fb is buggy, dev hsr_slave_1 [ 953.146919] protocol 88fb is buggy, dev hsr_slave_0 [ 953.152029] protocol 88fb is buggy, dev hsr_slave_1 12:31:24 executing program 2: [ 953.198689] audit: type=1800 audit(1547555484.718:1608): pid=26221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17484 res=0 [ 953.271896] protocol 88fb is buggy, dev hsr_slave_0 [ 953.277325] protocol 88fb is buggy, dev hsr_slave_1 [ 953.298576] audit: type=1804 audit(1547555484.758:1609): pid=26221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/223/file0" dev="sda1" ino=17484 res=1 12:31:24 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @local}, 0xc) 12:31:25 executing program 2: [ 953.591485] protocol 88fb is buggy, dev hsr_slave_0 [ 953.596619] protocol 88fb is buggy, dev hsr_slave_1 12:31:25 executing program 2: [ 954.356330] Y­4`Ò˜: renamed from lo 12:31:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @local}, 0xc) 12:31:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:26 executing program 2: 12:31:26 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0xffffffffffffffff) add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="d8f705be67f0483d18aeca53c1b984217d98ef0637d4306714c227409a4dd4be2c27ce394e2f7894f555d076286c3908e7a341183e980790c21c3b32ac3656f8957d6d28c5bb01aa1a75607a43304450041bea4887462c810ff5658173014e25a303a2bdd4787b3413f92c73744a03048139cb3a78cb4521081c27ddc4412f9500f82593c9c566e52348f4dd7cca67b27b1177cb2c85f57b0da4638a9359b2cfd4e47a1f7b6ddef9bdd6dc9f99531a85d67f0a11750594764b48ae9faddc6cb89d3c626842fa3e", 0xc7, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000000c0)) open$dir(0x0, 0x4000080004, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00', 0x1}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r6, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000200)) socket$inet(0x2, 0x5, 0x8) r7 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r6, r7, &(0x7f00000002c0), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[]}}, 0x0) 12:31:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:26 executing program 2: 12:31:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, 0x0, 0x0) 12:31:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:26 executing program 2: 12:31:26 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) request_key(&(0x7f0000000040)='id_resolver\x00', 0x0, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) openat$cgroup_ro(r1, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r2, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) socket$inet(0x2, 0x5, 0x8) r3 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r2, r3, &(0x7f00000002c0), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[]}}, 0x0) [ 955.294428] kauditd_printk_skb: 11 callbacks suppressed [ 955.294444] audit: type=1804 audit(1547555486.598:1619): pid=26271 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir341656010/syzkaller.k9YVXC/85/bus" dev="sda1" ino=16851 res=1 12:31:27 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(0xffffffffffffffff, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) [ 955.864370] audit: type=1800 audit(1547555486.888:1622): pid=26271 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="bus" dev="sda1" ino=16851 res=0 [ 956.002886] audit: type=1804 audit(1547555486.928:1623): pid=26274 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir341656010/syzkaller.k9YVXC/85/bus" dev="sda1" ino=16851 res=1 [ 956.141952] audit: type=1804 audit(1547555487.098:1624): pid=26297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir964179672/syzkaller.rrVdwJ/209/bus" dev="sda1" ino=16891 res=1 [ 956.233068] audit: type=1800 audit(1547555487.098:1625): pid=26297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor4" name="bus" dev="sda1" ino=16891 res=0 [ 956.270812] audit: type=1804 audit(1547555487.208:1626): pid=26299 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir964179672/syzkaller.rrVdwJ/209/bus" dev="sda1" ino=16891 res=1 [ 956.312343] audit: type=1804 audit(1547555487.388:1627): pid=26295 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir964179672/syzkaller.rrVdwJ/209/bus" dev="sda1" ino=16891 res=1 [ 956.339125] audit: type=1804 audit(1547555487.478:1628): pid=26302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir964179672/syzkaller.rrVdwJ/209/bus" dev="sda1" ino=16891 res=1 [ 956.366627] audit: type=1800 audit(1547555487.478:1629): pid=26302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor4" name="bus" dev="sda1" ino=16891 res=0 [ 956.391657] audit: type=1804 audit(1547555487.558:1630): pid=26293 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir964179672/syzkaller.rrVdwJ/209/bus" dev="sda1" ino=16891 res=1 12:31:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:28 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0xffffffffffffffff) add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="d8f705be67f0483d18aeca53c1b984217d98ef0637d4306714c227409a4dd4be2c27ce394e2f7894f555d076286c3908e7a341183e980790c21c3b32ac3656f8957d6d28c5bb01aa1a75607a43304450041bea4887462c810ff5658173014e25a303a2bdd4787b3413f92c73744a03048139cb3a78cb4521081c27ddc4412f9500f82593c9c566e52348f4dd7cca67b27b1177cb2c85f57b0da4638a9359b2cfd4e47a1f7b6ddef9bdd6dc9f99531a85d67f0a11750594764b48ae9faddc6cb89d3c626842fa3e", 0xc7, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000000c0)) open$dir(0x0, 0x4000080004, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00', 0x1}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r6, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000200)) socket$inet(0x2, 0x5, 0x8) r7 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r6, r7, &(0x7f00000002c0), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[]}}, 0x0) 12:31:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000240)={0x10, 0xf50c}, 0xb2, &(0x7f0000000100)={&(0x7f0000001400)={0x14}, 0xfdc4}}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f000039a000)=[{0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:31:28 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(0xffffffffffffffff, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:28 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) request_key(&(0x7f0000000040)='id_resolver\x00', 0x0, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) openat$cgroup_ro(r1, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r2, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) socket$inet(0x2, 0x5, 0x8) r3 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r2, r3, &(0x7f00000002c0), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[]}}, 0x0) 12:31:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:28 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(0xffffffffffffffff, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:28 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0xffffffffffffffff) add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="d8f705be67f0483d18aeca53c1b984217d98ef0637d4306714c227409a4dd4be2c27ce394e2f7894f555d076286c3908e7a341183e980790c21c3b32ac3656f8957d6d28c5bb01aa1a75607a43304450041bea4887462c810ff5658173014e25a303a2bdd4787b3413f92c73744a03048139cb3a78cb4521081c27ddc4412f9500f82593c9c566e52348f4dd7cca67b27b1177cb2c85f57b0da4638a9359b2cfd4e47a1f7b6ddef9bdd6dc9f99531a85d67f0a11750594764b48ae9faddc6cb89d3c626842fa3e", 0xc7, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='/dy\xbdv/autofs\x00', 0x20) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000000c0)) open$dir(0x0, 0x4000080004, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000540)={'syzkaller0\x00\x00\x05\x00', 0x1}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r6, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000200)) socket$inet(0x2, 0x5, 0x8) r7 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r6, r7, &(0x7f00000002c0), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[]}}, 0x0) 12:31:28 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:29 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000580)='bpf\x00', 0x0, &(0x7f0000000780)={[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 12:31:29 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)) request_key(&(0x7f0000000040)='id_resolver\x00', 0x0, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x7fffffffe, &(0x7f0000000840)={0xffffffffffffffff}) openat$cgroup_ro(r1, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f00000008c0)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\xfc\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xf4\b\x1a~\x91V1s\xe9\xbe\x9e\x9b\'\xcde\xb3\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1cO\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xf24\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socketpair(0x1, 0x80003, 0x1, &(0x7f0000000480)) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r2, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) socket$inet(0x2, 0x5, 0x8) r3 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r2, r3, &(0x7f00000002c0), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000b40)=ANY=[]}}, 0x0) [ 957.846477] SELinux: duplicate or incompatible mount options [ 957.905065] SELinux: duplicate or incompatible mount options 12:31:29 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) sendmsg$nl_generic(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000380)={0x14, 0x15, 0xa6e4322c112f7f89}, 0x14}}, 0x0) 12:31:29 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000002a40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='status\x00') preadv(r1, &(0x7f00000017c0), 0x324, 0x0) 12:31:29 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') pread64(r0, 0x0, 0x0, 0x42) 12:31:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:30 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 12:31:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00', 0x1132}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x4, [@random="a6ca19d8dcc6", @local, @empty, @empty]}) 12:31:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 12:31:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:30 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) [ 959.352064] net_ratelimit: 26 callbacks suppressed [ 959.352090] protocol 88fb is buggy, dev hsr_slave_0 [ 959.362722] protocol 88fb is buggy, dev hsr_slave_1 [ 959.368541] protocol 88fb is buggy, dev hsr_slave_0 [ 959.373940] protocol 88fb is buggy, dev hsr_slave_1 [ 959.380091] protocol 88fb is buggy, dev hsr_slave_0 [ 959.385420] protocol 88fb is buggy, dev hsr_slave_1 12:31:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) [ 959.522175] protocol 88fb is buggy, dev hsr_slave_0 [ 959.528023] protocol 88fb is buggy, dev hsr_slave_1 [ 959.841472] protocol 88fb is buggy, dev hsr_slave_0 [ 959.846662] protocol 88fb is buggy, dev hsr_slave_1 12:31:31 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) 12:31:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:31 executing program 2: 12:31:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:32 executing program 2: 12:31:32 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) [ 960.638718] kauditd_printk_skb: 21 callbacks suppressed [ 960.638732] audit: type=1800 audit(1547555492.158:1652): pid=26446 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16833 res=0 12:31:32 executing program 2: [ 960.786644] audit: type=1804 audit(1547555492.198:1653): pid=26446 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/540/file0" dev="sda1" ino=16833 res=1 12:31:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 961.225948] audit: type=1800 audit(1547555492.748:1654): pid=26455 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16551 res=0 [ 961.309939] audit: type=1804 audit(1547555492.758:1655): pid=26455 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/227/file0" dev="sda1" ino=16551 res=1 12:31:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:33 executing program 5: 12:31:33 executing program 2: 12:31:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x4e21, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 12:31:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:33 executing program 2: 12:31:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)) 12:31:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) [ 962.034487] audit: type=1800 audit(1547555493.548:1656): pid=26467 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16516 res=0 12:31:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flistxattr(r1, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) syz_genetlink_get_family_id$tipc(0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) [ 962.280034] audit: type=1804 audit(1547555493.558:1657): pid=26467 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/541/file0" dev="sda1" ino=16516 res=1 12:31:33 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:34 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f00000001c0)=[{}, {}, {}], 0x3, 0x0, 0x0, 0x0) 12:31:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0x0, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:34 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:34 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) getegid() fstat(r0, 0x0) 12:31:34 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 963.067788] audit: type=1800 audit(1547555494.588:1658): pid=26503 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16566 res=0 [ 963.210566] audit: type=1804 audit(1547555494.628:1659): pid=26503 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/542/file0" dev="sda1" ino=16566 res=1 [ 963.414262] audit: type=1800 audit(1547555494.638:1660): pid=26506 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16689 res=0 [ 963.524476] audit: type=1804 audit(1547555494.668:1661): pid=26506 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/228/file0" dev="sda1" ino=16689 res=1 12:31:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGREP(r0, 0x40047440, 0x0) 12:31:35 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) getegid() fstat(r0, 0x0) 12:31:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r1, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:35 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) getegid() fstat(r0, 0x0) 12:31:35 executing program 2: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000940)={0x0, {{0x2, 0x4e23, @empty}}, 0x1}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r4, &(0x7f00000000c0)=0x202, 0xdd) 12:31:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:35 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:35 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) getegid() fstat(r0, 0x0) 12:31:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGREP(r0, 0x40047440, 0x0) 12:31:36 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) getegid() 12:31:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:36 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:36 executing program 4: 12:31:36 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) 12:31:36 executing program 2: 12:31:36 executing program 4: [ 965.602075] net_ratelimit: 26 callbacks suppressed [ 965.602102] protocol 88fb is buggy, dev hsr_slave_0 [ 965.612404] protocol 88fb is buggy, dev hsr_slave_1 [ 965.618343] protocol 88fb is buggy, dev hsr_slave_0 [ 965.624004] protocol 88fb is buggy, dev hsr_slave_1 [ 965.630403] protocol 88fb is buggy, dev hsr_slave_0 [ 965.635597] protocol 88fb is buggy, dev hsr_slave_1 [ 965.752388] protocol 88fb is buggy, dev hsr_slave_0 [ 965.758186] protocol 88fb is buggy, dev hsr_slave_1 [ 966.071460] protocol 88fb is buggy, dev hsr_slave_0 [ 966.076603] protocol 88fb is buggy, dev hsr_slave_1 12:31:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 966.328393] kauditd_printk_skb: 4 callbacks suppressed [ 966.328405] audit: type=1800 audit(1547555497.838:1666): pid=26583 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16557 res=0 12:31:37 executing program 2: 12:31:37 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:37 executing program 4: 12:31:37 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:38 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:38 executing program 4: 12:31:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1012}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @local}}) [ 966.495914] audit: type=1804 audit(1547555497.888:1667): pid=26583 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/230/file0" dev="sda1" ino=16557 res=1 12:31:38 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) [ 966.808175] audit: type=1800 audit(1547555498.168:1668): pid=26596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16566 res=0 12:31:38 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:38 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x400) clone(0x8020002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) socket$inet_udp(0x2, 0x2, 0x0) [ 966.975188] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 967.096061] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 967.127209] audit: type=1804 audit(1547555498.188:1669): pid=26596 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/544/file0" dev="sda1" ino=16566 res=1 [ 967.339887] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:31:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:39 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:39 executing program 2: clone(0x4000000210007ba, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) inotify_init() mount(&(0x7f0000000100)=@filename='.\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x9008, 0x0) 12:31:39 executing program 4: unshare(0x24020400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff}) fcntl$setown(r1, 0x8, 0x0) [ 968.238212] audit: type=1800 audit(1547555499.748:1670): pid=26647 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16551 res=0 12:31:39 executing program 2: clone(0x4000000210007ba, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) inotify_init() mount(&(0x7f0000000100)=@filename='.\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x9008, 0x0) 12:31:39 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=',&!self\x00') clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:39 executing program 4: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 12:31:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 968.345166] audit: type=1804 audit(1547555499.788:1671): pid=26647 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/231/file0" dev="sda1" ino=16551 res=1 12:31:40 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:40 executing program 2: clone(0x4000000210007ba, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) inotify_init() mount(&(0x7f0000000100)=@filename='.\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x9008, 0x0) [ 968.639062] audit: type=1800 audit(1547555500.018:1672): pid=26663 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16918 res=0 12:31:40 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 968.879735] audit: type=1804 audit(1547555500.028:1673): pid=26663 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/545/file0" dev="sda1" ino=16918 res=1 12:31:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:41 executing program 2: clone(0x4000000210007ba, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) inotify_init() mount(&(0x7f0000000100)=@filename='.\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x9008, 0x0) 12:31:41 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:41 executing program 4: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0xfff, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f00000003c0), 0xed5f0dd4, 0x0, 0x0, 0x184) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x14, 0x15, 0x7, 0x0, 0x0, {0x0, 0xf0ffff, 0x600}}, 0x14}}, 0x0) 12:31:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:41 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:41 executing program 2: 12:31:41 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) [ 969.828700] audit: type=1800 audit(1547555501.348:1674): pid=26705 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16943 res=0 [ 969.854057] audit: type=1800 audit(1547555501.348:1675): pid=26706 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16944 res=0 12:31:41 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:41 executing program 2: 12:31:42 executing program 2: [ 971.275474] net_ratelimit: 14 callbacks suppressed [ 971.275483] protocol 88fb is buggy, dev hsr_slave_0 [ 971.285570] protocol 88fb is buggy, dev hsr_slave_1 [ 971.290727] protocol 88fb is buggy, dev hsr_slave_0 [ 971.295840] protocol 88fb is buggy, dev hsr_slave_1 12:31:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:43 executing program 2: 12:31:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:43 executing program 4: 12:31:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0x0, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:43 executing program 2: 12:31:43 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open$dir(&(0x7f0000000100)='./file0\x00', 0x30480, 0x0) [ 971.597112] kauditd_printk_skb: 2 callbacks suppressed [ 971.597125] audit: type=1800 audit(1547555503.118:1678): pid=26743 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16955 res=0 12:31:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) [ 971.831485] protocol 88fb is buggy, dev hsr_slave_0 [ 971.836658] protocol 88fb is buggy, dev hsr_slave_1 [ 971.841862] protocol 88fb is buggy, dev hsr_slave_0 [ 971.846935] protocol 88fb is buggy, dev hsr_slave_1 [ 971.852120] protocol 88fb is buggy, dev hsr_slave_0 12:31:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 971.853744] audit: type=1804 audit(1547555503.118:1679): pid=26743 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/547/file0" dev="sda1" ino=16955 res=1 [ 971.857197] protocol 88fb is buggy, dev hsr_slave_1 12:31:43 executing program 2: syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80) [ 972.089024] audit: type=1800 audit(1547555503.188:1680): pid=26747 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16914 res=0 12:31:43 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000600)) 12:31:43 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:43 executing program 2: openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 972.408503] audit: type=1804 audit(1547555503.218:1681): pid=26747 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/233/file0" dev="sda1" ino=16914 res=1 12:31:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x0, 0x0, 0x0) 12:31:44 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:44 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) dup3(r0, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:44 executing program 2: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000940)={0x0, {{0x2, 0x4e23, @empty}}, 0x1}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r4 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r4, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) r5 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) 12:31:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0x0, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:44 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 973.408098] audit: type=1326 audit(1547555504.928:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=26794 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0x0 [ 973.473053] audit: type=1800 audit(1547555504.978:1683): pid=26796 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16956 res=0 [ 973.498475] audit: type=1804 audit(1547555504.978:1684): pid=26796 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/548/file0" dev="sda1" ino=16956 res=1 [ 973.550529] audit: type=1800 audit(1547555505.038:1685): pid=26807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16908 res=0 12:31:45 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(0xffffffffffffffff, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:45 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 974.258785] audit: type=1804 audit(1547555505.048:1686): pid=26807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/234/file0" dev="sda1" ino=16908 res=1 12:31:45 executing program 4: 12:31:46 executing program 2: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000940)={0x0, {{0x2, 0x4e23, @empty}}, 0x1}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r4 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r4, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) r5 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) 12:31:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:46 executing program 4: 12:31:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(0xffffffffffffffff, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:46 executing program 4: 12:31:46 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000857c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:31:46 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:46 executing program 4: 12:31:46 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(0xffffffffffffffff, r2, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0x0, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:46 executing program 4: [ 975.450137] audit: type=1800 audit(1547555506.968:1687): pid=26863 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16954 res=0 12:31:47 executing program 2: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000940)={0x0, {{0x2, 0x4e23, @empty}}, 0x1}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r4 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r4, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) r5 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) 12:31:47 executing program 5: 12:31:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 12:31:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0xa0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, 0xe8) 12:31:47 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000002c0), 0xffffffffffffff94, 0x0, 0x0, 0x0) accept$packet(r2, 0x0, 0x0) close(r2) 12:31:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000340)="0adc1f123c123f319bc070") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f00000000c0)='./file0\x00'}, 0x7) 12:31:48 executing program 2: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000940)={0x0, {{0x2, 0x4e23, @empty}}, 0x1}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r4 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r4, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) r5 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) [ 977.094364] kauditd_printk_skb: 3 callbacks suppressed [ 977.094379] audit: type=1800 audit(1547555508.608:1691): pid=26906 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16946 res=0 [ 977.146256] audit: type=1804 audit(1547555508.618:1692): pid=26906 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/550/file0" dev="sda1" ino=16946 res=1 12:31:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:48 executing program 5: r0 = socket$kcm(0x29, 0x3, 0x0) close(r0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x3e6, 0xf687, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8981, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x8000, 0x4, 0x3f, 0x1, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000440), 0xf517) 12:31:48 executing program 4: lsetxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000300)={'U+', 0xd1d0}, 0x28, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 977.512549] net_ratelimit: 22 callbacks suppressed [ 977.512594] protocol 88fb is buggy, dev hsr_slave_0 [ 977.523716] protocol 88fb is buggy, dev hsr_slave_1 [ 977.524589] audit: type=1800 audit(1547555509.038:1693): pid=26918 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17025 res=0 [ 977.529982] protocol 88fb is buggy, dev hsr_slave_0 [ 977.556965] protocol 88fb is buggy, dev hsr_slave_1 [ 977.787753] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 977.803985] audit: type=1804 audit(1547555509.078:1694): pid=26918 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/236/file0" dev="sda1" ino=17025 res=1 12:31:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1a1, 0x0) 12:31:49 executing program 2: request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpid() open$dir(0x0, 0x4000080004, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) creat(&(0x7f0000000680)='./bus\x00', 0x0) 12:31:49 executing program 4: unshare(0x24020400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000d000)={0xffffffffffffffff}) r2 = getpid() fcntl$setown(r1, 0x8, r2) [ 978.081537] protocol 88fb is buggy, dev hsr_slave_0 [ 978.086681] protocol 88fb is buggy, dev hsr_slave_1 [ 978.091842] protocol 88fb is buggy, dev hsr_slave_0 [ 978.096921] protocol 88fb is buggy, dev hsr_slave_1 [ 978.102075] protocol 88fb is buggy, dev hsr_slave_0 [ 978.107164] protocol 88fb is buggy, dev hsr_slave_1 12:31:49 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) preadv(r0, &(0x7f0000005ec0)=[{&(0x7f0000000280)=""/42, 0x2a}], 0x1, 0x0) 12:31:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, 0x0, 0x0, 0x0) [ 978.428015] audit: type=1804 audit(1547555509.948:1695): pid=26939 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir961478231/syzkaller.O2Wrd4/138/bus" dev="sda1" ino=16950 res=1 [ 978.671493] audit: type=1804 audit(1547555510.028:1696): pid=26944 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir961478231/syzkaller.O2Wrd4/138/bus" dev="sda1" ino=16950 res=1 [ 978.779573] audit: type=1804 audit(1547555510.048:1697): pid=26944 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir961478231/syzkaller.O2Wrd4/138/bus" dev="sda1" ino=16950 res=1 12:31:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:50 executing program 5: fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0xffffffffffffffff) add_key(0x0, &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) unshare(0x48000) getpid() open$dir(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) ftruncate(r0, 0x2008200) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) 12:31:50 executing program 4: read$eventfd(0xffffffffffffffff, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000340)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) [ 978.895757] audit: type=1804 audit(1547555510.048:1698): pid=26939 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir961478231/syzkaller.O2Wrd4/138/bus" dev="sda1" ino=16950 res=1 [ 978.991349] audit: type=1804 audit(1547555510.508:1699): pid=26953 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir341656010/syzkaller.k9YVXC/127/bus" dev="sda1" ino=16908 res=1 [ 979.057737] audit: type=1804 audit(1547555510.578:1700): pid=26958 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir341656010/syzkaller.k9YVXC/127/bus" dev="sda1" ino=16908 res=1 12:31:50 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:50 executing program 2: fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0xffffffffffffffff) add_key(&(0x7f0000000100)='rxrpc\x00', 0x0, &(0x7f00000001c0)="d8f705be67f0483d18aeca53c1b984217d98ef0637d4306714c227409a4dd4be2c27ce394e2f7894f555d076286c3908e7a341183e980790c21c3b32ac3656f8957d6d28c5bb01aa1a75607a43304450041bea4887462c810ff5658173014e25a303a2bdd4787b3413f92c73744a03048139cb3a78cb4521081c27ddc4412f9500f82593c9c566e52348f4dd7cca67b27b1177cb2c85f57b0da4638a9359b2cfd4e47a1f7b6ddef9bdd6dc9f99531a85d67f0a11750594764b48ae9faddc6cb89d3c626842fa3e", 0xc7, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) unshare(0x48000) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x2}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x7fffffffe, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, 0x0) socketpair(0x1, 0x80003, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x1) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x401) ftruncate(r1, 0x2008200) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) socket$inet(0x2, 0x5, 0x8) r2 = open(&(0x7f0000000140)='./bus\x00', 0x4000, 0x0) sendfile(r1, r2, &(0x7f00000002c0), 0x8000fffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 12:31:50 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, 0x0, 0x0, 0x0) 12:31:50 executing program 5: 12:31:51 executing program 5: 12:31:51 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') dup3(r0, r2, 0x0) preadv(r2, 0x0, 0x0, 0x0) 12:31:51 executing program 5: 12:31:51 executing program 4: 12:31:51 executing program 2: 12:31:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:52 executing program 3: 12:31:52 executing program 5: 12:31:52 executing program 2: 12:31:52 executing program 4: 12:31:52 executing program 3: 12:31:52 executing program 5: 12:31:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:52 executing program 3: 12:31:52 executing program 2: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r5 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r5, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) socket$inet6(0xa, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r6, &(0x7f00000000c0)=0x202, 0xdd) 12:31:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42400) 12:31:52 executing program 5: add_key(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2008200) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) creat(&(0x7f0000000680)='./bus\x00', 0x0) 12:31:53 executing program 4: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000940)={0x0, {{0x2, 0x4e23, @empty}}, 0x1}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r5 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r5, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) r6 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r7, &(0x7f00000000c0)=0x202, 0xdd) accept4$packet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0x14, 0x80000) 12:31:53 executing program 3: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0x40046205, 0x0) 12:31:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:53 executing program 2: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r5 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r5, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) socket$inet6(0xa, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r6, &(0x7f00000000c0)=0x202, 0xdd) 12:31:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x7fc, 0x8) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r1) unshare(0x40000000) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0/bus\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0xd1d0}, 0x28, 0x2) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) sysinfo(&(0x7f0000000500)=""/94) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000005c0)) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8040}, 0x20040000) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) creat(&(0x7f0000000580)='./file0/file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x400c000}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$inet6(r2, &(0x7f00000004c0)={0xa, 0x0, 0x0, @empty}, &(0x7f00000006c0)=0x1c) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) socket$inet(0x2, 0x2, 0x0) 12:31:53 executing program 3: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r5 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r5, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) socket$inet6(0xa, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r6, &(0x7f00000000c0)=0x202, 0xdd) [ 982.121093] binder: 27037:27041 ioctl 40046205 0 returned -22 [ 982.285084] kauditd_printk_skb: 22 callbacks suppressed [ 982.285098] audit: type=1800 audit(1547555513.798:1723): pid=27049 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=17265 res=0 12:31:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 982.459268] audit: type=1804 audit(1547555513.848:1724): pid=27049 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/553/file0" dev="sda1" ino=17265 res=1 [ 982.629956] audit: type=1800 audit(1547555514.148:1725): pid=27062 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17169 res=0 [ 982.736609] IPVS: ftp: loaded support on port[0] = 21 [ 982.745183] audit: type=1804 audit(1547555514.178:1726): pid=27062 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/239/file0" dev="sda1" ino=17169 res=1 [ 982.909251] loop5: p1 p2 p3 p4 < > 12:31:54 executing program 2: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) 12:31:54 executing program 4: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000940)={0x0, {{0x2, 0x4e23, @empty}}, 0x1}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r5 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r5, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) r6 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r7, &(0x7f00000000c0)=0x202, 0xdd) accept4$packet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0x14, 0x80000) 12:31:54 executing program 3: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r5 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r5, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) socket$inet6(0xa, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r6, &(0x7f00000000c0)=0x202, 0xdd) [ 983.435185] IPVS: ftp: loaded support on port[0] = 21 12:31:55 executing program 2: getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001200)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\xcd\xca\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\xc0\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\x02\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000940)={0x0, {{0x2, 0x4e23, @empty}}, 0x1}, 0x90) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'hwsim0\x00', 0x8000}) getdents64(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x8) r3 = syz_open_pts(0xffffffffffffffff, 0x8100) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000280)=0x1) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r5 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) ioctl(r5, 0x6, &(0x7f0000000dc0)="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") creat(&(0x7f0000000540)='./bus/../file0\x00', 0x4) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617}) r6 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r7, &(0x7f00000000c0)=0x202, 0xdd) accept4$packet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0x14, 0x80000) [ 983.752466] net_ratelimit: 26 callbacks suppressed [ 983.752510] protocol 88fb is buggy, dev hsr_slave_0 [ 983.763756] protocol 88fb is buggy, dev hsr_slave_1 [ 983.770022] protocol 88fb is buggy, dev hsr_slave_0 [ 983.775811] protocol 88fb is buggy, dev hsr_slave_1 12:31:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:55 executing program 4: clone(0x802182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0x40046205, &(0x7f00000000c0)={0xfffffffffffffec4, 0x0, 0x0, 0x21c, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000100)="fc"}) 12:31:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000200)=""/175) [ 984.311469] protocol 88fb is buggy, dev hsr_slave_0 [ 984.370284] audit: type=1800 audit(1547555515.888:1727): pid=27096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=17201 res=0 [ 984.471528] protocol 88fb is buggy, dev hsr_slave_0 [ 984.476689] protocol 88fb is buggy, dev hsr_slave_1 [ 984.537702] audit: type=1804 audit(1547555515.928:1728): pid=27096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/554/file0" dev="sda1" ino=17201 res=1 12:31:58 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x7fc, 0x8) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r1) unshare(0x40000000) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0/bus\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0xd1d0}, 0x28, 0x2) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) sysinfo(&(0x7f0000000500)=""/94) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000005c0)) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8040}, 0x20040000) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) creat(&(0x7f0000000580)='./file0/file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x400c000}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$inet6(r2, &(0x7f00000004c0)={0xa, 0x0, 0x0, @empty}, &(0x7f00000006c0)=0x1c) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) socket$inet(0x2, 0x2, 0x0) 12:31:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) 12:31:58 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000001e80)={0x73, @rand_addr=0x7fff, 0x4e22, 0x2, 'wrr\x00', 0x20, 0x4, 0xa}, 0x2c) r2 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$TIOCSTI(r2, 0x5412, 0x20) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x400}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, 0x0, 0x4) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fdatasync(r3) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x800000000000003) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x0, 0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) r6 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_AIE_OFF(r5, 0x7002) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0)={0x77359400}, 0x10) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="0207000002000000008d527a2efa4a36184c69e8dc7ba6ab31025540186353409840cadf19981e11d2a3018eeadfc8c7b9bbedefe1b75493887a1ea7eacd904af6e245f136bc6c22406f56c0c43ae425a2cbc252a8da3c92d033cbaf6667c722da34d4419890579ecb3f0f3a73390c084bf0c3743faa13c040c5ac1ae18a5ec484bd23360c3cec319d1e4688dfdb492e951d460870"], 0x95}}, 0x0) 12:31:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:31:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x4c, &(0x7f0000000080)=0x3, 0x4) 12:31:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 986.706672] IPVS: set_ctl: invalid protocol: 115 0.0.127.255:20002 [ 986.707906] audit: type=1800 audit(1547555518.218:1729): pid=27118 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16721 res=0 12:31:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x7fc, 0x8) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r1) unshare(0x40000000) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0/bus\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0xd1d0}, 0x28, 0x2) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) sysinfo(&(0x7f0000000500)=""/94) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000005c0)) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8040}, 0x20040000) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) creat(&(0x7f0000000580)='./file0/file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000800)=ANY=[@ANYBLOB="000028bd7000fddbdf2507000000640004000c00010073797a310000000014000700080001001000000008000100150000000c000700080002007f000000340007000800040000000000080001000a00000008000200010000000800020009000000080001000100000008000100100000009800010044000400200001000a004e2400000000ff020000000000000000000000000001ffff0000200002000a004e2300000003fe8000000000000000000000000000bb090000000c00010069623a7369743000100001007564703a73797a30000000003400020008000400070000000800040047060000080002000800000008000200050000000800010000000000080002000000000034000900080001004f0000000800020003000000080001000300000008000200050000000800010001ffffff080002002c000000"], 0x1}, 0x1, 0x0, 0x0, 0x400c000}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$inet6(r2, &(0x7f00000004c0)={0xa, 0x0, 0x0, @empty}, &(0x7f00000006c0)=0x1c) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) socket$inet(0x2, 0x2, 0x0) 12:31:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) [ 986.803498] audit: type=1800 audit(1547555518.258:1730): pid=27121 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16786 res=0 [ 986.836780] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 986.986956] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) 12:31:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) [ 987.153839] audit: type=1804 audit(1547555518.258:1732): pid=27118 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/240/file0" dev="sda1" ino=16721 res=1 [ 987.243169] IPVS: set_ctl: invalid protocol: 115 0.0.127.255:20002 12:31:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) [ 987.584079] audit: type=1804 audit(1547555518.258:1731): pid=27121 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/555/file0" dev="sda1" ino=16786 res=1 12:31:59 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000001e80)={0x73, @rand_addr=0x7fff, 0x4e22, 0x2, 'wrr\x00', 0x20, 0x4, 0xa}, 0x2c) r2 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$TIOCSTI(r2, 0x5412, 0x20) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='/exe\x00\x00\x00\x00\x00\x04\x89\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\x1e\x18\xf0\xc7o\xbb#*\aBJ\xe1\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xe0q\xfb53\x1c\xe3\x9cZ\x00\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x400}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, 0x0, 0x4) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fdatasync(r3) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x800000000000003) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x0, 0xffffffffffffffff) read$eventfd(r2, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) r6 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_AIE_OFF(r5, 0x7002) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000000c0)={0x77359400}, 0x10) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="0207000002000000008d527a2efa4a36184c69e8dc7ba6ab31025540186353409840cadf19981e11d2a3018eeadfc8c7b9bbedefe1b75493887a1ea7eacd904af6e245f136bc6c22406f56c0c43ae425a2cbc252a8da3c92d033cbaf6667c722da34d4419890579ecb3f0f3a73390c084bf0c3743faa13c040c5ac1ae18a5ec484bd23360c3cec319d1e4688dfdb492e951d460870"], 0x95}}, 0x0) [ 987.733383] loop3: p1 p2 p3 p4 < > 12:31:59 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) [ 987.888216] IPVS: ftp: loaded support on port[0] = 21 [ 987.912541] protocol 88fb is buggy, dev hsr_slave_0 [ 987.918039] protocol 88fb is buggy, dev hsr_slave_1 [ 987.924601] protocol 88fb is buggy, dev hsr_slave_0 [ 987.947049] IPVS: set_ctl: invalid protocol: 115 0.0.127.255:20002 [ 988.097863] loop5: p1 p2 p3 p4 < > [ 988.125813] IPVS: ftp: loaded support on port[0] = 21 [ 988.312270] SELinux: mount invalid. Same superblock, different security settings for (dev tracefs, type tracefs) [ 988.895520] __loop_clr_fd: partition scan of loop3 failed (rc=-22) [ 988.908930] print_req_error: 550 callbacks suppressed [ 988.908941] print_req_error: I/O error, dev loop3, sector 301 flags 80700 [ 988.938110] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 988.945187] buffer_io_error: 546 callbacks suppressed [ 988.945198] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 988.961692] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 988.968309] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 988.976262] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 988.982929] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 988.990550] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 988.997705] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 989.005583] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 989.012282] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 989.019921] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 989.026597] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 989.034970] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 989.041784] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 989.054597] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 989.061463] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 989.069366] print_req_error: I/O error, dev loop3, sector 301 flags 0 [ 989.076156] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 989.083857] Buffer I/O error on dev loop3p4, logical block 0, async page read 12:32:01 executing program 5: 12:32:01 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) 12:32:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:01 executing program 2: 12:32:01 executing program 3: 12:32:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0x0, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:01 executing program 4: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) [ 990.344882] audit: type=1800 audit(1547555521.858:1733): pid=27183 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16833 res=0 12:32:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) dup2(r0, r1) [ 990.433488] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 12:32:02 executing program 3: mkdir(0x0, 0x0) open$dir(0x0, 0x0, 0x0) pipe(0x0) close(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='posix_acl_accessproc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000002c0)={0x0, {{0xa, 0x4e24, 0xfff, @ipv4={[], [], @multicast2}, 0x1}}}, 0x88) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7}]}, 0x0}, 0x48) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r3 = getpgrp(0x0) ptrace$getsig(0x4202, r3, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r2, &(0x7f0000001640)=ANY=[], 0xf5aab446) getresuid(&(0x7f0000000440), 0x0, &(0x7f0000000200)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getgroups(0x1, &(0x7f0000001640)=[0xee00]) getgid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000003400)) getresgid(&(0x7f0000003480), 0x0, &(0x7f0000003500)) getresgid(&(0x7f0000003540), &(0x7f0000003580), &(0x7f00000035c0)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000003600)) lstat(&(0x7f0000003700)='./file1\x00', &(0x7f0000003740)) fstat(r1, &(0x7f0000003a00)) fstat(r2, &(0x7f0000007080)) lstat(&(0x7f0000007100)='./file1\x00', &(0x7f0000007140)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000007bc0)='/selinux/checkreqprot\x00', 0x80, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000007c40)) getgid() sendmmsg$unix(r1, &(0x7f000000b680)=[{&(0x7f0000001700)=@file={0x0, '.\x00'}, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001b40)="1bcc5cf31f612f7bc116309524da224b515deb059996cd67ce896e7d098d7a9ca6e43a6391b079e2a311bd431480545d0d7eb6827ed231d37436fd789b7a23672e88a7309054b9f6a6eb5b33e54111de95d341d039c44177b524392b6fc9335fe86e6551e359bdd445a690", 0x6b}], 0x1, 0x0, 0x0, 0x1}, {&(0x7f0000001c40)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f00000030c0)=[{&(0x7f0000002fc0)="bddb1300193aafcad19700e120582109b10761f7ea5e68986bb3e51cb8afec15146d27b11a9ca3e157dcfe20bcb092d143bc10e29123fa45f1fbed5e0de2aaafa5a8da71924890e678c6edc311de6f39a3eceecfe25c27e7f06b93a7a8b450efb96e7d713301a42287994a8a275330e6738688c2c968e04a17e60723e97f577601c45491cf03412e48acdc3140229b10bdf071d5e54b456834f7e28cfae1aee4b8018ccc1bd139e891e6cf848756f393793c6ba5398298b92c541f3a0840a446a18bbca8d2984c3fa6403d2980426339a0b4b4aa442da56bf425b3c9398b9fb9", 0xe0}], 0x1, 0x0, 0x0, 0x4000}, {&(0x7f00000031c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000033c0)=[{&(0x7f0000003300)="78694acc7b6439180b8554c285163399670dab90128ef866dbbb8e25b415a6489209526262bf3348db226a8a27914ebc7ce73eb264489794685c7c552f27e3a8035ab9e7097f4ffb370fab1128b4404ed8132e69cc7770803a3c87cbe5d2e5a33c64a356141241efea2c60fe84a9e24a0dc147bb294c33b2fe25c6e07250597d7dc33ca6f705323a36c4eac523d23c9930c2dbfab54f0bdc8f2596", 0x9b}], 0x1, 0x0, 0x0, 0x1}, {&(0x7f0000003880)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f00000039c0)=[{&(0x7f0000003900)="616184cacc969baf770ae4779127c76b130249697c6d9023f3de5d330d8772bc9b3690ea1ac9c23b0cc7265d875f885bfad3b46973625817931325a8b82ca4b4f6d486f62da2db915a04ce67e5aad740a6fe29fff45af33b7dfb5947f42fa9bac616629ec1691d62e5cb92d4d8323d55a4689840127a9feb6902e860dbb5aedecbc1536935b960bdec78dbbf460ea43aa934bcb42615", 0x96}], 0x1}, {&(0x7f0000005bc0)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000007000)=[{&(0x7f0000006f00)="2577f359edbf2cf1d94862e58550af1f3677277429221ef5ae82e7f0b2ee0bb4f530165f5e7e4c64966ca8cfced71ecc2fee98c9795d8a6dc2c6a2aad1c9347e68ada7d8c54e93db184e7e2710b6ba21072d50b8d143af73af009a2a6ad190ad0d0d1c867604e56a8f8aafde3a1de037e3c7579042bfd1359b50d005be1ef11d3d0161a60e0dc693da3dbfa400f3dabe025197956e8bd7f643ee1ab654d45ddbf308efc7476ea89a5fa6ea92a07259fb4e262b869478f2b19c8dfbe088fa20c3545e86", 0xc3}], 0x1, 0x0, 0x0, 0x4004001}, {&(0x7f00000072c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000075c0)=[{&(0x7f00000074c0)="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", 0xfa}], 0x1, 0x0, 0x0, 0x20044080}, {&(0x7f0000007680)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000007b40)=[{&(0x7f0000007a80)="fa9c0ae353d1821e227924c9d42c63d30fc5df181dd52439cdc7ae0f94cf132a1aabb7599f60da054a74e20d56b3e8020be6b1540b9bedd7c83fa929129f85e0b4b29b9dddd031252f3277e658f79b8eeda9c572dc3cae18634c3a2e46004b9d0de161ae593478ab2fd8c1d82b72d01c6715c99c45772ecd39452e2abf3be9d2e514e838440ac0085d589c4ca9bf8109e1b9e6", 0x93}], 0x1, 0x0, 0x0, 0x8800}, {&(0x7f0000007d00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000008e40)=[{&(0x7f0000008e00)="bfd560933c", 0x5}], 0x1, 0x0, 0x0, 0x20000004}, {&(0x7f0000008ec0)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f000000b2c0)=[{&(0x7f000000a2c0)="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", 0x780}], 0x1, 0x0, 0x0, 0x4041}], 0x9, 0x11) write$cgroup_type(r4, &(0x7f0000000000)='threaded\x00', 0x9) [ 990.551507] net_ratelimit: 9 callbacks suppressed [ 990.551516] protocol 88fb is buggy, dev hsr_slave_0 [ 990.561530] protocol 88fb is buggy, dev hsr_slave_1 [ 990.566669] protocol 88fb is buggy, dev hsr_slave_0 [ 990.571782] protocol 88fb is buggy, dev hsr_slave_1 [ 990.576903] protocol 88fb is buggy, dev hsr_slave_0 [ 990.582019] protocol 88fb is buggy, dev hsr_slave_1 [ 990.712502] protocol 88fb is buggy, dev hsr_slave_0 [ 990.718090] protocol 88fb is buggy, dev hsr_slave_1 12:32:02 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) [ 990.751558] audit: type=1804 audit(1547555521.868:1734): pid=27183 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/556/file0" dev="sda1" ino=16833 res=1 12:32:02 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xe9u\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 12:32:02 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303030322c6d6f64653d30303030303030303030303030303030303013d635dd302c646566636f6e746578743d"]) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 991.194897] audit: type=1800 audit(1547555521.898:1735): pid=27181 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16801 res=0 [ 991.366155] SELinux: security_context_str_to_sid() failed for (dev bpf, type bpf) errno=-22 12:32:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) 12:32:03 executing program 2: creat(0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4, r1, 0x400002, 0x0) [ 991.532741] audit: type=1804 audit(1547555521.908:1736): pid=27181 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/241/file0" dev="sda1" ino=16801 res=1 [ 991.619220] SELinux: security_context_str_to_sid() failed for (dev bpf, type bpf) errno=-22 [ 992.071467] protocol 88fb is buggy, dev hsr_slave_0 [ 992.076581] protocol 88fb is buggy, dev hsr_slave_1 12:32:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 12:32:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000300)=""/4096, 0x1000}], 0x1, 0x0) 12:32:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0x0, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:03 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) 12:32:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 992.466793] audit: type=1800 audit(1547555523.988:1737): pid=27243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16808 res=0 12:32:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) [ 992.590179] audit: type=1804 audit(1547555524.018:1738): pid=27243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/557/file0" dev="sda1" ino=16808 res=1 [ 992.946719] audit: type=1800 audit(1547555524.068:1739): pid=27245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16802 res=0 12:32:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) [ 993.199422] audit: type=1804 audit(1547555524.078:1740): pid=27245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/242/file0" dev="sda1" ino=16802 res=1 12:32:04 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') lseek(r0, 0x0, 0x80000000000001) 12:32:04 executing program 3: 12:32:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') lseek(r0, 0x0, 0x80000000000001) 12:32:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) 12:32:05 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 12:32:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') lseek(r0, 0x0, 0x80000000000001) 12:32:05 executing program 2: 12:32:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0x0, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:05 executing program 3: 12:32:05 executing program 4: socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) 12:32:05 executing program 3: 12:32:05 executing program 2: [ 994.269373] audit: type=1800 audit(1547555525.788:1741): pid=27290 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16809 res=0 12:32:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') lseek(r0, 0x0, 0x80000000000001) 12:32:05 executing program 4: socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) 12:32:05 executing program 3: 12:32:06 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3}, 0x10) [ 994.495489] audit: type=1804 audit(1547555525.818:1742): pid=27290 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/558/file0" dev="sda1" ino=16809 res=1 [ 994.831256] audit: type=1800 audit(1547555525.928:1743): pid=27298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16807 res=0 [ 994.946795] audit: type=1804 audit(1547555525.948:1744): pid=27298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/243/file0" dev="sda1" ino=16807 res=1 12:32:07 executing program 4: socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff}, 0x20) 12:32:07 executing program 5: lseek(0xffffffffffffffff, 0x0, 0x80000000000001) 12:32:07 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)={0x9e, 0x75, 0x2, {0x93, "51d5c96404586ba52c705109018da65e188764abd9d9aec28c5c904f0534a12fe4901cba91733df239665e12703653e099e328198b12619bc706d2f9592096aa41104575bba759cd964e6f473efb75e3460d44a8a7622c0f9a74ccf6f69e48d717f8645f742d22f7c9a9032b97fe9896fcfce36d027b013a2752fdf04dd127541494572c6c4e3f964260c742dffa6632eaacd1"}}, 0x9e) r1 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x0) write$P9_RUNLINKAT(r1, 0x0, 0xffffffffffffffa9) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) inotify_init() setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)={@empty, @remote, 0x1, 0x8, [@remote, @empty, @empty, @loopback, @local, @empty, @dev={0xac, 0x14, 0x14, 0xc}, @local]}, 0x30) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r4, 0x8993, &(0x7f0000000040)={'team0\x00', @ifru_names='veth1_to_bond\x00'}) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000380)=""/237) r5 = memfd_create(&(0x7f0000000540)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00O\x04\x1e\xb9\a5\xaeP\xdfP\x0e\x01\xe7\xbc\x02\bQ\xc0\xd8\xac\xaf\x7f\x01\x1bo\xc3JtVo(\x93u\x9f\x95\xadg\xd7\xb2n\xba[%\xc8;\rS~;\xb7\xd0v\x16\xfeeW\x06q\x14@\xa7+`\xe3|k\xf5\xe0/L\x15\xd9~\xe3[\xea\xe8\xdby\xf3\xea3\x1b\x94\x97Y%+\xeel\x01\xa2\xc5m\x93\xfa\xa1\xa4\x93Q\xd3\xd4\x03B\xae', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) preadv(r5, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000015c0)=""/4096, 0xfffffe1f}], 0x2, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x101, 0x0, 0x8000}, 0x4) 12:32:07 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 12:32:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}], 0x1, 0x0) 12:32:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x0, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:07 executing program 5: r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x0, 0x80000000000001) [ 995.854146] audit: type=1800 audit(1547555527.378:1745): pid=27322 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=17121 res=0 12:32:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) [ 995.950707] audit: type=1804 audit(1547555527.378:1746): pid=27322 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/559/file0" dev="sda1" ino=17121 res=1 12:32:07 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0x0, 0x0}) 12:32:07 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') lseek(0xffffffffffffffff, 0x0, 0x80000000000001) [ 996.231481] net_ratelimit: 18 callbacks suppressed [ 996.231489] protocol 88fb is buggy, dev hsr_slave_0 [ 996.241618] protocol 88fb is buggy, dev hsr_slave_1 [ 996.246786] protocol 88fb is buggy, dev hsr_slave_0 [ 996.251902] protocol 88fb is buggy, dev hsr_slave_1 12:32:07 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) [ 996.372671] audit: type=1800 audit(1547555527.508:1747): pid=27330 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17041 res=0 12:32:07 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) 12:32:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 12:32:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') lseek(r0, 0x0, 0x0) [ 996.621579] audit: type=1804 audit(1547555527.518:1748): pid=27330 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/244/file0" dev="sda1" ino=17041 res=1 [ 996.791473] protocol 88fb is buggy, dev hsr_slave_0 [ 996.796592] protocol 88fb is buggy, dev hsr_slave_1 [ 996.801785] protocol 88fb is buggy, dev hsr_slave_0 [ 996.806855] protocol 88fb is buggy, dev hsr_slave_1 [ 996.812011] protocol 88fb is buggy, dev hsr_slave_0 [ 996.817075] protocol 88fb is buggy, dev hsr_slave_1 12:32:08 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)={0x9e, 0x75, 0x2, {0x93, "51d5c96404586ba52c705109018da65e188764abd9d9aec28c5c904f0534a12fe4901cba91733df239665e12703653e099e328198b12619bc706d2f9592096aa41104575bba759cd964e6f473efb75e3460d44a8a7622c0f9a74ccf6f69e48d717f8645f742d22f7c9a9032b97fe9896fcfce36d027b013a2752fdf04dd127541494572c6c4e3f964260c742dffa6632eaacd1"}}, 0x9e) r1 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x0) write$P9_RUNLINKAT(r1, 0x0, 0xffffffffffffffa9) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) inotify_init() setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)={@empty, @remote, 0x1, 0x8, [@remote, @empty, @empty, @loopback, @local, @empty, @dev={0xac, 0x14, 0x14, 0xc}, @local]}, 0x30) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r4, 0x8993, &(0x7f0000000040)={'team0\x00', @ifru_names='veth1_to_bond\x00'}) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000380)=""/237) r5 = memfd_create(&(0x7f0000000540)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00O\x04\x1e\xb9\a5\xaeP\xdfP\x0e\x01\xe7\xbc\x02\bQ\xc0\xd8\xac\xaf\x7f\x01\x1bo\xc3JtVo(\x93u\x9f\x95\xadg\xd7\xb2n\xba[%\xc8;\rS~;\xb7\xd0v\x16\xfeeW\x06q\x14@\xa7+`\xe3|k\xf5\xe0/L\x15\xd9~\xe3[\xea\xe8\xdby\xf3\xea3\x1b\x94\x97Y%+\xeel\x01\xa2\xc5m\x93\xfa\xa1\xa4\x93Q\xd3\xd4\x03B\xae', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) preadv(r5, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000015c0)=""/4096, 0xfffffe1f}], 0x2, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x101, 0x0, 0x8000}, 0x4) 12:32:08 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000025c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) epoll_create1(0x80003) epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x110, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f09811624c2f43040cc8b8d570728e9fafff91e41a78f", 0x2c}], 0x1, 0x81806) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast2}, 0x10) keyctl$unlink(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') preadv(r2, &(0x7f00000017c0), 0x3ba, 0x0) 12:32:09 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}], 0x1, 0x0) 12:32:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x0, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') lseek(r0, 0x0, 0x0) 12:32:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xff}, 0x20) 12:32:09 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000025c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) epoll_create1(0x80003) epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x110, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b0010947db9141978d2d9c93f59a4f3ec7e1e3f09811624c2f43040cc8b8d570728e9fafff91e41a78f", 0x2c}], 0x1, 0x81806) bind$inet(r1, &(0x7f0000000240)={0x2, 0x4e23, @multicast2}, 0x10) keyctl$unlink(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') preadv(r2, &(0x7f00000017c0), 0x3ba, 0x0) 12:32:09 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)={0x9e, 0x75, 0x2, {0x93, "51d5c96404586ba52c705109018da65e188764abd9d9aec28c5c904f0534a12fe4901cba91733df239665e12703653e099e328198b12619bc706d2f9592096aa41104575bba759cd964e6f473efb75e3460d44a8a7622c0f9a74ccf6f69e48d717f8645f742d22f7c9a9032b97fe9896fcfce36d027b013a2752fdf04dd127541494572c6c4e3f964260c742dffa6632eaacd1"}}, 0x9e) r1 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x0) write$P9_RUNLINKAT(r1, 0x0, 0xffffffffffffffa9) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) inotify_init() setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)={@empty, @remote, 0x1, 0x8, [@remote, @empty, @empty, @loopback, @local, @empty, @dev={0xac, 0x14, 0x14, 0xc}, @local]}, 0x30) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r4, 0x8993, &(0x7f0000000040)={'team0\x00', @ifru_names='veth1_to_bond\x00'}) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000380)=""/237) r5 = memfd_create(&(0x7f0000000540)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00O\x04\x1e\xb9\a5\xaeP\xdfP\x0e\x01\xe7\xbc\x02\bQ\xc0\xd8\xac\xaf\x7f\x01\x1bo\xc3JtVo(\x93u\x9f\x95\xadg\xd7\xb2n\xba[%\xc8;\rS~;\xb7\xd0v\x16\xfeeW\x06q\x14@\xa7+`\xe3|k\xf5\xe0/L\x15\xd9~\xe3[\xea\xe8\xdby\xf3\xea3\x1b\x94\x97Y%+\xeel\x01\xa2\xc5m\x93\xfa\xa1\xa4\x93Q\xd3\xd4\x03B\xae', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) preadv(r5, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000015c0)=""/4096, 0xfffffe1f}], 0x2, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000200)={0x101, 0x0, 0x8000}, 0x4) 12:32:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='status\x00') lseek(r0, 0x0, 0x0) 12:32:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xff}, 0x20) 12:32:09 executing program 2: 12:32:09 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xff}, 0x20) 12:32:09 executing program 5: 12:32:09 executing program 2: 12:32:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}], 0x1, 0x0) 12:32:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:10 executing program 5: 12:32:10 executing program 2: 12:32:10 executing program 3: 12:32:10 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000}, 0x20) [ 999.367615] kauditd_printk_skb: 5 callbacks suppressed [ 999.367629] audit: type=1800 audit(1547555530.888:1754): pid=27402 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16802 res=0 12:32:10 executing program 5: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) getrandom(&(0x7f0000000480)=""/235, 0xeb, 0x2) stat(0x0, 0x0) [ 999.429298] audit: type=1804 audit(1547555530.918:1755): pid=27402 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/561/file0" dev="sda1" ino=16802 res=1 12:32:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) clone(0x36828903, 0x0, 0x0, 0x0, 0x0) 12:32:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x400000, 0x0) clone(0x36828903, 0x0, 0x0, 0x0, 0x0) 12:32:11 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 12:32:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000}, 0x20) [ 999.685488] audit: type=1800 audit(1547555531.208:1756): pid=27418 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16813 res=0 12:32:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000}, 0x20) [ 999.928560] audit: type=1804 audit(1547555531.228:1757): pid=27418 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/246/file0" dev="sda1" ino=16813 res=1 12:32:12 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 12:32:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x36828903, 0x0, 0x0, 0x0, 0x0) 12:32:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) clone(0x36828903, 0x0, 0x0, 0x0, 0x0) 12:32:12 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 12:32:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:12 executing program 5: r0 = socket$inet6(0xa, 0x9000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000006b00)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="000000000000000008001c00", @ANYRES32], 0x2}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 12:32:12 executing program 4: r0 = socket(0x2, 0x8001, 0x0) connect$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8202fffffffffffffff95b784076a2e7662359fd319e11bb74b23b2e00000000000000fc3ba40e3dfd52280e7e7234833a04f67a7293138db1d5b9d3db58fd8b7c96ca98d178c79fb9ecba16e96be370421fe04e34beedd9ae069cd0b84b156f70476d85ca244bb06a322f5ce70079ee39be68542ddca8b0932ff4a269ff2cc27ad2b6ce38af2949532e77ddad7aa782ce332bfb4f3886ac60b31ec476926e683cbfe4369000e49bc9ef94ea1794ef3f8f5a9517283394ebc1024223648c70d629"], 0x1) 12:32:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) clone(0x36828903, 0x0, 0x0, 0x0, 0x0) 12:32:12 executing program 5: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\a\x00\x00\xa4\xd1\x19i\x8f\x1c\x12u\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xcb\x85\xb4\xb7\xa15\x05\x88t<\x8d\x9b\xaf\x1f\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x8b\v\xd6\xdc\xaf!\xbc!\x13\x17\xff\xef3\x86|\xcc[\x8f\x149\xb5m4\x16b\xbc\x88\x80\x97\x98C\xb35R6\xbe\x93Bd\x85\xf9\x9f\x87\x99\x8fH\xad\x7f\xfa)\xbd\xa0\x80\xd7\x01\xb7\r%$\a!\x8f\xada.\aE\x83Ag\x11\xec\x10S\xba@\xf2h\t\xa9Qq\xa9') fsetxattr(r0, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f00000000c0)='\x00', 0xfe9, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) [ 1001.179327] audit: type=1800 audit(1547555532.698:1758): pid=27456 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=17329 res=0 [ 1001.461808] audit: type=1804 audit(1547555532.708:1759): pid=27456 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/562/file0" dev="sda1" ino=17329 res=1 12:32:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) clone(0x36828903, 0x0, 0x0, 0x0, 0x0) 12:32:13 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="2cb1ed1444e4319a3c5da7d0476bc728"}, 0x1c) [ 1001.659566] audit: type=1800 audit(1547555532.728:1760): pid=27459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17000 res=0 12:32:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0xb, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000061170c00000000009500000000000000d84449b3dc1dfee5c60c32309d9670deec1205bd4c8e7c4b654e0365d0b9f3238a0b7b125088902b1208ad36c64d6c08c93cd6d78938418602000000000000"], 0x0, 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 12:32:13 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000300)={0x4, 0xfc3e}, 0x3f4d7e7c) [ 1001.991028] audit: type=1804 audit(1547555532.738:1761): pid=27459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/247/file0" dev="sda1" ino=17000 res=1 12:32:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) clone(0x36828903, 0x0, 0x0, 0x0, 0x0) 12:32:13 executing program 2: [ 1002.315675] audit: type=1400 audit(1547555533.698:1762): avc: denied { ioctl } for pid=27483 comm="syz-executor4" path="socket:[91093]" dev="sockfs" ino=91093 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1002.471981] net_ratelimit: 18 callbacks suppressed [ 1002.472036] protocol 88fb is buggy, dev hsr_slave_0 [ 1002.483429] protocol 88fb is buggy, dev hsr_slave_1 [ 1002.490231] protocol 88fb is buggy, dev hsr_slave_0 [ 1002.495831] protocol 88fb is buggy, dev hsr_slave_1 12:32:14 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 12:32:14 executing program 5: 12:32:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x36828903, 0x0, 0x0, 0x0, 0x0) 12:32:14 executing program 2: 12:32:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:14 executing program 3: clone(0x36828903, 0x0, 0x0, 0x0, 0x0) 12:32:14 executing program 2: [ 1002.934353] audit: type=1800 audit(1547555534.458:1763): pid=27498 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=17017 res=0 12:32:14 executing program 5: [ 1003.031488] protocol 88fb is buggy, dev hsr_slave_0 [ 1003.036600] protocol 88fb is buggy, dev hsr_slave_1 [ 1003.041756] protocol 88fb is buggy, dev hsr_slave_0 [ 1003.046838] protocol 88fb is buggy, dev hsr_slave_1 [ 1003.051984] protocol 88fb is buggy, dev hsr_slave_0 [ 1003.057055] protocol 88fb is buggy, dev hsr_slave_1 12:32:14 executing program 4: 12:32:14 executing program 2: 12:32:14 executing program 5: 12:32:15 executing program 4: 12:32:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x1, 0x0) 12:32:15 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:32:15 executing program 2: 12:32:15 executing program 5: 12:32:15 executing program 4: 12:32:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:15 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000001c80)=[{{&(0x7f0000000200)=@in={0x2, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000640)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 12:32:16 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f00000025c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x1, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') preadv(r0, &(0x7f00000017c0), 0x3ba, 0x0) [ 1004.445291] kauditd_printk_skb: 3 callbacks suppressed [ 1004.445303] audit: type=1800 audit(1547555535.968:1767): pid=27537 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17002 res=0 12:32:16 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:32:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) accept(0xffffffffffffff9c, 0x0, 0x0) [ 1004.516083] audit: type=1804 audit(1547555535.998:1768): pid=27537 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/249/file0" dev="sda1" ino=17002 res=1 [ 1004.708329] audit: type=1800 audit(1547555536.068:1769): pid=27541 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=17020 res=0 12:32:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = dup2(r0, r0) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGREP(r1, 0x80084503, 0x0) ioctl$FIONREAD(r1, 0x541b, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 12:32:16 executing program 2: openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x3) clock_adjtime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) restart_syscall() openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000100)=[0xff, 0x8]) [ 1004.908730] audit: type=1804 audit(1547555536.078:1770): pid=27541 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/564/file0" dev="sda1" ino=17020 res=1 [ 1005.287973] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 1005.288817] loop4: partition table partially beyond EOD, truncated [ 1005.543255] loop4: p1 start 1 is beyond EOD, truncated [ 1005.551165] loop4: p2 size 2 extends beyond EOD, truncated [ 1005.652971] loop4: p3 start 201 is beyond EOD, truncated [ 1005.691813] loop4: p4 start 301 is beyond EOD, truncated [ 1005.699629] loop4: p5 start 1 is beyond EOD, truncated [ 1005.707051] loop4: p6 start 1 is beyond EOD, truncated [ 1005.714168] loop4: p7 start 1 is beyond EOD, truncated [ 1005.720633] loop4: p8 start 1 is beyond EOD, truncated [ 1005.726788] loop4: p9 start 1 is beyond EOD, truncated [ 1005.733754] loop4: p10 start 1 is beyond EOD, truncated [ 1005.740998] loop4: p11 start 1 is beyond EOD, truncated [ 1005.748531] loop4: p12 start 1 is beyond EOD, truncated [ 1005.754797] loop4: p13 start 1 is beyond EOD, truncated [ 1005.762568] loop4: p14 start 1 is beyond EOD, truncated [ 1005.768042] loop4: p15 start 1 is beyond EOD, truncated [ 1005.779034] loop4: p16 start 1 is beyond EOD, truncated [ 1005.785595] loop4: p17 start 1 is beyond EOD, truncated [ 1005.791050] loop4: p18 start 1 is beyond EOD, truncated [ 1005.803369] loop4: p19 start 1 is beyond EOD, truncated [ 1005.808818] loop4: p20 start 1 is beyond EOD, truncated [ 1005.819211] loop4: p21 start 1 is beyond EOD, truncated [ 1005.825984] loop4: p22 start 1 is beyond EOD, truncated [ 1005.837655] loop4: p23 start 1 is beyond EOD, truncated [ 1005.849791] loop4: p24 start 1 is beyond EOD, truncated [ 1005.855906] loop4: p25 start 1 is beyond EOD, truncated [ 1005.862363] loop4: p26 start 1 is beyond EOD, truncated [ 1005.868101] loop4: p27 start 1 is beyond EOD, truncated [ 1005.874439] loop4: p28 start 1 is beyond EOD, truncated [ 1005.882962] loop4: p29 start 1 is beyond EOD, truncated [ 1005.889650] loop4: p30 start 1 is beyond EOD, truncated [ 1005.895214] loop4: p31 start 1 is beyond EOD, truncated 12:32:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 12:32:17 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:32:17 executing program 5: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) r1 = socket$key(0xf, 0x3, 0x2) r2 = dup3(r1, r1, 0x7fffe) ioctl$KDSKBLED(r2, 0x4b65, 0x0) clock_adjtime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f00000003c0)={'IDLETIMER\x00'}, &(0x7f0000000400)=0x1e) restart_syscall() sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="020a000002000000000000000000000495fa9bc0da2417e204600f6770e1fc0ff3cb212c4acf532a124d43a94421c67d6a67bd8761a7c2b44494be0a538e366b3c250e28450893e51b9a547ddc72f53c446d04e92f64190876d23bfbe7c3d8a8000000"], 0x63}}, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000100)=[0xff, 0x8]) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)="b263ee5a1bcef63459b4f40355602cf7adbae54cc867baba0d071e23587aa480503fc4639569efa52060753fa9da41bfdf11ea37998515daed2e7434a5493fc7d9567d4235afffb69fa8c25dcad47238307fd82864b6", 0x56) 12:32:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 1005.900715] loop4: p32 start 1 is beyond EOD, truncated [ 1005.906418] loop4: p33 start 1 is beyond EOD, truncated [ 1005.912119] loop4: p34 start 1 is beyond EOD, truncated [ 1005.917573] loop4: p35 start 1 is beyond EOD, truncated [ 1005.923156] loop4: p36 start 1 is beyond EOD, truncated [ 1005.940741] loop4: p37 start 1 is beyond EOD, truncated [ 1005.952706] loop4: p38 start 1 is beyond EOD, truncated [ 1005.959290] loop4: p39 start 1 is beyond EOD, truncated [ 1005.966864] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=27582 comm=syz-executor2 [ 1005.971981] loop4: p40 start 1 is beyond EOD, truncated [ 1006.011978] loop4: p41 start 1 is beyond EOD, truncated [ 1006.046242] audit: type=1800 audit(1547555537.548:1771): pid=27584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17458 res=0 [ 1006.077281] loop4: p42 start 1 is beyond EOD, truncated [ 1006.107249] loop4: p43 start 1 is beyond EOD, truncated [ 1006.127534] loop4: p44 start 1 is beyond EOD, truncated [ 1006.135983] audit: type=1804 audit(1547555537.558:1772): pid=27584 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/250/file0" dev="sda1" ino=17458 res=1 [ 1006.169598] loop4: p45 start 1 is beyond EOD, truncated [ 1006.175189] loop4: p46 start 1 is beyond EOD, truncated [ 1006.180644] loop4: p47 start 1 is beyond EOD, truncated [ 1006.191989] loop4: p48 start 1 is beyond EOD, truncated [ 1006.197481] loop4: p49 start 1 is beyond EOD, truncated [ 1006.208823] audit: type=1800 audit(1547555537.588:1773): pid=27588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=17472 res=0 12:32:17 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) sendfile(r0, r1, 0x0, 0x9) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 1006.256570] loop4: p50 start 1 is beyond EOD, truncated [ 1006.262280] loop4: p51 start 1 is beyond EOD, truncated [ 1006.278393] audit: type=1804 audit(1547555537.608:1774): pid=27588 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir093499463/syzkaller.x2sdiD/565/file0" dev="sda1" ino=17472 res=1 12:32:17 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() [ 1006.289603] loop4: p52 start 1 is beyond EOD, truncated [ 1006.331904] loop4: p53 start 1 is beyond EOD, truncated [ 1006.384370] loop4: p54 start 1 is beyond EOD, truncated [ 1006.410166] loop4: p55 start 1 is beyond EOD, truncated [ 1006.421225] loop4: p56 start 1 is beyond EOD, truncated [ 1006.450176] loop4: p57 start 1 is beyond EOD, truncated 12:32:18 executing program 5: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) r1 = socket$key(0xf, 0x3, 0x2) r2 = dup3(r1, r1, 0x7fffe) ioctl$KDSKBLED(r2, 0x4b65, 0x0) clock_adjtime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f00000003c0)={'IDLETIMER\x00'}, &(0x7f0000000400)=0x1e) restart_syscall() sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="020a000002000000000000000000000495fa9bc0da2417e204600f6770e1fc0ff3cb212c4acf532a124d43a94421c67d6a67bd8761a7c2b44494be0a538e366b3c250e28450893e51b9a547ddc72f53c446d04e92f64190876d23bfbe7c3d8a8000000"], 0x63}}, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000100)=[0xff, 0x8]) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)="b263ee5a1bcef63459b4f40355602cf7adbae54cc867baba0d071e23587aa480503fc4639569efa52060753fa9da41bfdf11ea37998515daed2e7434a5493fc7d9567d4235afffb69fa8c25dcad47238307fd82864b6", 0x56) [ 1006.488156] loop4: p58 start 1 is beyond EOD, truncated [ 1006.508350] loop4: p59 start 1 is beyond EOD, truncated [ 1006.523100] loop4: p60 start 1 is beyond EOD, truncated [ 1006.532173] loop4: p61 start 1 is beyond EOD, truncated [ 1006.547385] loop4: p62 start 1 is beyond EOD, truncated [ 1006.555448] loop4: p63 start 1 is beyond EOD, truncated [ 1006.591531] loop4: p64 start 1 is beyond EOD, truncated [ 1006.613917] loop4: p65 start 1 is beyond EOD, truncated [ 1006.636107] loop4: p66 start 1 is beyond EOD, truncated [ 1006.645111] loop4: p67 start 1 is beyond EOD, truncated [ 1006.658181] loop4: p68 start 1 is beyond EOD, truncated [ 1006.666196] loop4: p69 start 1 is beyond EOD, truncated [ 1006.674481] loop4: p70 start 1 is beyond EOD, truncated [ 1006.682200] loop4: p71 start 1 is beyond EOD, truncated [ 1006.688686] loop4: p72 start 1 is beyond EOD, truncated [ 1006.696468] loop4: p73 start 1 is beyond EOD, truncated [ 1006.708764] loop4: p74 start 1 is beyond EOD, truncated [ 1006.716072] loop4: p75 start 1 is beyond EOD, truncated [ 1006.726066] loop4: p76 start 1 is beyond EOD, truncated [ 1006.733668] loop4: p77 start 1 is beyond EOD, truncated [ 1006.740002] loop4: p78 start 1 is beyond EOD, truncated [ 1006.750165] loop4: p79 start 1 is beyond EOD, truncated [ 1006.758154] loop4: p80 start 1 is beyond EOD, truncated [ 1006.766155] loop4: p81 start 1 is beyond EOD, truncated [ 1006.786726] loop4: p82 start 1 is beyond EOD, truncated [ 1006.862885] loop4: p83 start 1 is beyond EOD, truncated 12:32:18 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 1006.935983] loop4: p84 start 1 is beyond EOD, truncated [ 1006.947378] loop4: p85 start 1 is beyond EOD, truncated [ 1006.971493] loop4: p86 start 1 is beyond EOD, truncated [ 1007.001458] loop4: p87 start 1 is beyond EOD, truncated [ 1007.015923] loop4: p88 start 1 is beyond EOD, truncated [ 1007.047554] loop4: p89 start 1 is beyond EOD, truncated [ 1007.076483] loop4: p90 start 1 is beyond EOD, truncated [ 1007.117245] loop4: p91 start 1 is beyond EOD, truncated [ 1007.172356] loop4: p92 start 1 is beyond EOD, truncated [ 1007.180325] loop4: p93 start 1 is beyond EOD, truncated [ 1007.212566] loop4: p94 start 1 is beyond EOD, truncated [ 1007.218148] loop4: p95 start 1 is beyond EOD, truncated [ 1007.243889] loop4: p96 start 1 is beyond EOD, truncated [ 1007.275055] loop4: p97 start 1 is beyond EOD, truncated [ 1007.300869] loop4: p98 start 1 is beyond EOD, truncated [ 1007.331164] loop4: p99 start 1 is beyond EOD, truncated [ 1007.374012] loop4: p100 start 1 is beyond EOD, truncated [ 1007.411543] loop4: p101 start 1 is beyond EOD, truncated [ 1007.417150] loop4: p102 start 1 is beyond EOD, truncated [ 1007.437257] loop4: p103 start 1 is beyond EOD, truncated [ 1007.443202] loop4: p104 start 1 is beyond EOD, truncated [ 1007.448839] loop4: p105 start 1 is beyond EOD, truncated [ 1007.454578] loop4: p106 start 1 is beyond EOD, truncated [ 1007.460188] loop4: p107 start 1 is beyond EOD, truncated [ 1007.466080] loop4: p108 start 1 is beyond EOD, truncated [ 1007.471750] loop4: p109 start 1 is beyond EOD, truncated [ 1007.477613] loop4: p110 start 1 is beyond EOD, truncated [ 1007.490303] loop4: p111 start 1 is beyond EOD, truncated [ 1007.498705] loop4: p112 start 1 is beyond EOD, truncated [ 1007.505661] loop4: p113 start 1 is beyond EOD, truncated [ 1007.527229] loop4: p114 start 1 is beyond EOD, truncated [ 1007.550611] loop4: p115 start 1 is beyond EOD, truncated [ 1007.557162] loop4: p116 start 1 is beyond EOD, truncated [ 1007.562851] loop4: p117 start 1 is beyond EOD, truncated [ 1007.568556] loop4: p118 start 1 is beyond EOD, truncated [ 1007.574492] loop4: p119 start 1 is beyond EOD, truncated [ 1007.583174] loop4: p120 start 1 is beyond EOD, truncated [ 1007.588808] loop4: p121 start 1 is beyond EOD, truncated [ 1007.594464] loop4: p122 start 1 is beyond EOD, truncated [ 1007.600171] loop4: p123 start 1 is beyond EOD, truncated [ 1007.606345] loop4: p124 start 1 is beyond EOD, truncated [ 1007.615109] loop4: p125 start 1 is beyond EOD, truncated [ 1007.621098] loop4: p126 start 1 is beyond EOD, truncated [ 1007.627181] loop4: p127 start 1 is beyond EOD, truncated [ 1007.638858] loop4: p128 start 1 is beyond EOD, truncated [ 1007.650224] loop4: p129 start 1 is beyond EOD, truncated [ 1007.670045] loop4: p130 start 1 is beyond EOD, truncated [ 1007.678986] loop4: p131 start 1 is beyond EOD, truncated [ 1007.690433] loop4: p132 start 1 is beyond EOD, truncated [ 1007.698578] loop4: p133 start 1 is beyond EOD, truncated [ 1007.708965] loop4: p134 start 1 is beyond EOD, truncated [ 1007.716931] loop4: p135 start 1 is beyond EOD, truncated [ 1007.722692] loop4: p136 start 1 is beyond EOD, truncated [ 1007.728270] loop4: p137 start 1 is beyond EOD, truncated [ 1007.734144] loop4: p138 start 1 is beyond EOD, truncated [ 1007.739650] loop4: p139 start 1 is beyond EOD, truncated [ 1007.746085] loop4: p140 start 1 is beyond EOD, truncated [ 1007.751886] loop4: p141 start 1 is beyond EOD, truncated [ 1007.757356] loop4: p142 start 1 is beyond EOD, truncated [ 1007.769256] loop4: p143 start 1 is beyond EOD, truncated [ 1007.775713] loop4: p144 start 1 is beyond EOD, truncated [ 1007.781331] loop4: p145 start 1 is beyond EOD, truncated [ 1007.786962] loop4: p146 start 1 is beyond EOD, truncated [ 1007.792730] loop4: p147 start 1 is beyond EOD, truncated [ 1007.798200] loop4: p148 start 1 is beyond EOD, truncated [ 1007.804061] loop4: p149 start 1 is beyond EOD, truncated [ 1007.809600] loop4: p150 start 1 is beyond EOD, truncated [ 1007.815112] loop4: p151 start 1 is beyond EOD, truncated [ 1007.820557] loop4: p152 start 1 is beyond EOD, truncated [ 1007.826035] loop4: p153 start 1 is beyond EOD, truncated [ 1007.831530] loop4: p154 start 1 is beyond EOD, truncated [ 1007.836987] loop4: p155 start 1 is beyond EOD, truncated [ 1007.842479] loop4: p156 start 1 is beyond EOD, truncated [ 1007.847941] loop4: p157 start 1 is beyond EOD, truncated [ 1007.853427] loop4: p158 start 1 is beyond EOD, truncated [ 1007.858881] loop4: p159 start 1 is beyond EOD, truncated [ 1007.864365] loop4: p160 start 1 is beyond EOD, truncated [ 1007.869818] loop4: p161 start 1 is beyond EOD, truncated [ 1007.876180] loop4: p162 start 1 is beyond EOD, truncated [ 1007.881692] loop4: p163 start 1 is beyond EOD, truncated [ 1007.887159] loop4: p164 start 1 is beyond EOD, truncated [ 1007.892657] loop4: p165 start 1 is beyond EOD, truncated [ 1007.898102] loop4: p166 start 1 is beyond EOD, truncated [ 1007.903584] loop4: p167 start 1 is beyond EOD, truncated [ 1007.909039] loop4: p168 start 1 is beyond EOD, truncated [ 1007.914546] loop4: p169 start 1 is beyond EOD, truncated [ 1007.920002] loop4: p170 start 1 is beyond EOD, truncated [ 1007.925509] loop4: p171 start 1 is beyond EOD, truncated [ 1007.930980] loop4: p172 start 1 is beyond EOD, truncated [ 1007.936488] loop4: p173 start 1 is beyond EOD, truncated [ 1007.941955] loop4: p174 start 1 is beyond EOD, truncated [ 1007.947407] loop4: p175 start 1 is beyond EOD, truncated [ 1007.952913] loop4: p176 start 1 is beyond EOD, truncated [ 1007.958366] loop4: p177 start 1 is beyond EOD, truncated [ 1007.963857] loop4: p178 start 1 is beyond EOD, truncated [ 1007.969310] loop4: p179 start 1 is beyond EOD, truncated [ 1007.974818] loop4: p180 start 1 is beyond EOD, truncated [ 1007.980291] loop4: p181 start 1 is beyond EOD, truncated [ 1007.985786] loop4: p182 start 1 is beyond EOD, truncated [ 1007.993236] loop4: p183 start 1 is beyond EOD, truncated [ 1007.998701] loop4: p184 start 1 is beyond EOD, truncated [ 1008.004817] loop4: p185 start 1 is beyond EOD, truncated [ 1008.010277] loop4: p186 start 1 is beyond EOD, truncated [ 1008.015804] loop4: p187 start 1 is beyond EOD, truncated [ 1008.021338] loop4: p188 start 1 is beyond EOD, truncated [ 1008.026867] loop4: p189 start 1 is beyond EOD, truncated [ 1008.032360] loop4: p190 start 1 is beyond EOD, truncated [ 1008.037806] loop4: p191 start 1 is beyond EOD, truncated [ 1008.043290] loop4: p192 start 1 is beyond EOD, truncated [ 1008.048751] loop4: p193 start 1 is beyond EOD, truncated [ 1008.054358] loop4: p194 start 1 is beyond EOD, truncated [ 1008.059906] loop4: p195 start 1 is beyond EOD, truncated [ 1008.065419] loop4: p196 start 1 is beyond EOD, truncated [ 1008.070866] loop4: p197 start 1 is beyond EOD, truncated [ 1008.076819] loop4: p198 start 1 is beyond EOD, truncated [ 1008.082332] loop4: p199 start 1 is beyond EOD, truncated [ 1008.087778] loop4: p200 start 1 is beyond EOD, truncated [ 1008.093277] loop4: p201 start 1 is beyond EOD, truncated [ 1008.098728] loop4: p202 start 1 is beyond EOD, truncated [ 1008.104226] loop4: p203 start 1 is beyond EOD, truncated [ 1008.109687] loop4: p204 start 1 is beyond EOD, truncated [ 1008.115202] loop4: p205 start 1 is beyond EOD, truncated [ 1008.120651] loop4: p206 start 1 is beyond EOD, truncated [ 1008.126147] loop4: p207 start 1 is beyond EOD, truncated [ 1008.132490] loop4: p208 start 1 is beyond EOD, truncated [ 1008.137941] loop4: p209 start 1 is beyond EOD, truncated [ 1008.143437] loop4: p210 start 1 is beyond EOD, truncated [ 1008.148889] loop4: p211 start 1 is beyond EOD, truncated [ 1008.154384] loop4: p212 start 1 is beyond EOD, truncated [ 1008.159829] loop4: p213 start 1 is beyond EOD, truncated [ 1008.165316] loop4: p214 start 1 is beyond EOD, truncated [ 1008.170768] loop4: p215 start 1 is beyond EOD, truncated [ 1008.176267] loop4: p216 start 1 is beyond EOD, truncated [ 1008.181750] loop4: p217 start 1 is beyond EOD, truncated [ 1008.187189] loop4: p218 start 1 is beyond EOD, truncated [ 1008.192678] loop4: p219 start 1 is beyond EOD, truncated [ 1008.198139] loop4: p220 start 1 is beyond EOD, truncated [ 1008.203630] loop4: p221 start 1 is beyond EOD, truncated [ 1008.209083] loop4: p222 start 1 is beyond EOD, truncated [ 1008.214585] loop4: p223 start 1 is beyond EOD, truncated [ 1008.220035] loop4: p224 start 1 is beyond EOD, truncated [ 1008.225512] loop4: p225 start 1 is beyond EOD, truncated [ 1008.230972] loop4: p226 start 1 is beyond EOD, truncated [ 1008.236472] loop4: p227 start 1 is beyond EOD, truncated [ 1008.241954] loop4: p228 start 1 is beyond EOD, truncated [ 1008.247389] loop4: p229 start 1 is beyond EOD, truncated [ 1008.252895] loop4: p230 start 1 is beyond EOD, truncated [ 1008.258344] loop4: p231 start 1 is beyond EOD, truncated [ 1008.264432] loop4: p232 start 1 is beyond EOD, truncated [ 1008.269892] loop4: p233 start 1 is beyond EOD, truncated [ 1008.275417] loop4: p234 start 1 is beyond EOD, truncated [ 1008.280864] loop4: p235 start 1 is beyond EOD, truncated [ 1008.286357] loop4: p236 start 1 is beyond EOD, truncated [ 1008.291840] loop4: p237 start 1 is beyond EOD, truncated [ 1008.297323] loop4: p238 start 1 is beyond EOD, truncated [ 1008.302813] loop4: p239 start 1 is beyond EOD, truncated [ 1008.308269] loop4: p240 start 1 is beyond EOD, truncated [ 1008.313787] loop4: p241 start 1 is beyond EOD, truncated [ 1008.319233] loop4: p242 start 1 is beyond EOD, truncated [ 1008.324747] loop4: p243 start 1 is beyond EOD, truncated [ 1008.330192] loop4: p244 start 1 is beyond EOD, truncated [ 1008.335681] loop4: p245 start 1 is beyond EOD, truncated [ 1008.341134] loop4: p246 start 1 is beyond EOD, truncated [ 1008.346615] loop4: p247 start 1 is beyond EOD, truncated [ 1008.352119] loop4: p248 start 1 is beyond EOD, truncated [ 1008.357669] loop4: p249 start 1 is beyond EOD, truncated [ 1008.363156] loop4: p250 start 1 is beyond EOD, truncated [ 1008.368613] loop4: p251 start 1 is beyond EOD, truncated [ 1008.374125] loop4: p252 start 1 is beyond EOD, truncated [ 1008.379578] loop4: p253 start 1 is beyond EOD, truncated [ 1008.385084] loop4: p254 start 1 is beyond EOD, truncated [ 1008.390546] loop4: p255 start 1 is beyond EOD, truncated 12:32:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x380, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x18}, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000, 0xffffffff], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x6, 0xff, 0x4, 0x40}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x401, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0xc00000000000, 0x5, 0x7fffffff, 0x4, 0x1, 0x8, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6], 0xa}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)=r4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(r5, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:19 executing program 2: prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/4096) request_key(&(0x7f0000001000)='dns_resolver\x00', &(0x7f0000001040)={'syz', 0x2}, &(0x7f0000001080)='\x00', 0xfffffffffffffff9) rename(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)='./file0\x00') pipe(&(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) bind$netlink(r1, &(0x7f0000001180)={0x10, 0x0, 0x25dfdbfb, 0x80000080}, 0xc) getsockopt$inet6_int(r1, 0x29, 0x50, &(0x7f00000011c0), 0x0) r2 = creat(&(0x7f0000001200)='./file0\x00', 0x69) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000001240)=0x3) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000001280)) setsockopt$sock_int(r2, 0x1, 0xc, &(0x7f00000012c0)=0x6, 0x4) r3 = accept$unix(r1, &(0x7f0000001300), &(0x7f0000001380)=0x6e) r4 = perf_event_open$cgroup(&(0x7f0000001400)={0x1, 0x70, 0xd3, 0x800, 0x4, 0x40, 0x0, 0xe04e, 0x200, 0x1, 0xff, 0x8001, 0x20, 0x8, 0x6, 0x1, 0x7, 0x4, 0x2, 0x6, 0x9, 0x3, 0x80000001, 0x28, 0x752, 0xfff, 0x9, 0xffffffffffffffc1, 0x200, 0x0, 0x2, 0xa6e, 0x10000, 0x9, 0x3ff, 0x7, 0x7, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f00000013c0), 0x2}, 0x0, 0x6, 0xfffffffffffffff8, 0x3, 0x7, 0x1e0, 0x1}, r2, 0x10, r2, 0x4) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000001480)="5c12a7b36c92fb939afee7f9fc930273", 0x10) r5 = mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, 0x102013, r2, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000016c0)={0x4c, 0x0, &(0x7f0000001580)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x50, 0x10, &(0x7f00000014c0)=[@fda={0x66646185, 0x5, 0x0, 0x38}, @fd={0x66642a85, 0x0, r3, 0x0, 0x4}, @flat={0x776a2a85, 0x1, r5, 0x3}], &(0x7f0000001540)=[0x48, 0x68]}, 0x4}}], 0x9a, 0x0, &(0x7f0000001600)="89856c2e470d1d86ba2e84691375292e2cd5d787f03e3e24824116efe839d82f0e8e424f375930843b8ca141225d1b4a59de3701bdba98596b0c29dc381824e2db9ddaff1a9ba0525d7387d5560ab48bee013af40701e379927f957dfe1fc11d85c111a3525ed59a582dc401e99ae895562f59c8dffbea9acfeadf2988392ef906a01d5394910bfeaf6022d1d0ab638b89c7e1cc430ea2cd3ae9"}) getdents(r1, &(0x7f0000001700)=""/229, 0xe5) prctl$PR_SVE_GET_VL(0x33, 0x1a7f9) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000001800)) r6 = creat(&(0x7f0000001840)='./file0\x00', 0x1) write$apparmor_current(r2, &(0x7f0000001880)=@profile={'stack ', 'z\x00'}, 0x8) signalfd(r0, &(0x7f00000018c0)={0xffffffff}, 0x8) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000001900)={0x6, 0x7ff, 0x6, 0xd9, 0x7f, 0x7}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000001940)=0x200) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000001980)=0x0) prlimit64(r7, 0x4, &(0x7f00000019c0)={0xfff, 0x1f}, &(0x7f0000001a00)) 12:32:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c0070f776ea3eac8fc1763e17685009f90cedfff8", 0x16}], 0x0, 0x0) 12:32:19 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 12:32:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) accept(0xffffffffffffff9c, 0x0, 0x0) 12:32:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00'}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 1008.496879] audit: type=1800 audit(1547555540.018:1775): pid=27634 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16933 res=0 [ 1008.547954] audit: type=1800 audit(1547555540.018:1776): pid=27632 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=17008 res=0 [ 1008.584587] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1008.647541] FAT-fs (loop3): bogus logical sector size 15990 12:32:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000240)=@fragment, 0x350) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000040)) [ 1008.712455] net_ratelimit: 26 callbacks suppressed [ 1008.712502] protocol 88fb is buggy, dev hsr_slave_0 [ 1008.722737] protocol 88fb is buggy, dev hsr_slave_1 [ 1008.728736] protocol 88fb is buggy, dev hsr_slave_0 [ 1008.734552] protocol 88fb is buggy, dev hsr_slave_1 [ 1008.744306] FAT-fs (loop3): Can't find a valid FAT filesystem 12:32:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0x1, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) 12:32:20 executing program 2: gettid() getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, &(0x7f0000000100)) socket$pppoe(0x18, 0x1, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25c", 0xb2}], 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r1, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8de8bb324c2284deca2d3f0b8d25df5f25a1df248d41ee95b806c2e83583df8d543c9438645d62f78b0a64c18d9d22cf1e6eb84e34b16b10a5906a52420c5900d4d5dd9e9d10222ef70ab0c969991ac513542a3a0c925b0082ca5dccb8d49aab79f27da2bbd031224b713fe7996a19db3f4665e45fb7da9c5b32a36a9b1c8a01ac6e15e846e695940e504df0bad031baa01653e9a22e89738c8fd13e07df569e136"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r2 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000340), 0x8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000640)=ANY=[@ANYBLOB="2c008f3f2bb45e1294796b9c475893d17a373e3183134d65016e5e7f99055d430206fa5fb1dcae26a44f884fb4475ed77cff1b422041887c89e138cc73a22883a430e239012747d572130a1dcee1a4ab415d9f00aa24d99466b1a68fba1c5de7fad8da50cda0387dbb026460d2f7870caa5d6c02a383f7c8960f7206d5a12753f7405cfadf565fa695cbc31b502233b79617806e2ecc9cf5dc5e19537f21cbceb00279000000000088cbc23dbd3f88bb350c34"]) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000780)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x816}, 0xc, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000000000c000300a7090000000000000c000600030000000000000008000100000000000c0006000200000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="e7055d86493b3b5e67c1fea7bf6c23786d579ea2b9fdeca83e33a5fd168f17e307922a2baf725f49e5fd1bccbe3c1131e0c1daec033b9177af99b2b1783076558ac638d136df31cc0eb59dcbf6b3457ab03102f747ec9855fab291f3a6f431b1c0f93e3c9adeece2a4e06e9e000000000000"], 0x1) [ 1009.271494] protocol 88fb is buggy, dev hsr_slave_0 [ 1009.276687] protocol 88fb is buggy, dev hsr_slave_1 [ 1009.281846] protocol 88fb is buggy, dev hsr_slave_0 [ 1009.286909] protocol 88fb is buggy, dev hsr_slave_1 [ 1009.292039] protocol 88fb is buggy, dev hsr_slave_0 [ 1009.297113] protocol 88fb is buggy, dev hsr_slave_1 [ 1009.338918] loop4: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 12:32:21 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 12:32:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{}, {r0, 0x8301}], 0x2, 0x0, 0x0, 0x0) [ 1009.339047] loop4: partition table partially beyond EOD, truncated [ 1009.577031] loop4: p1 start 1 is beyond EOD, truncated [ 1009.677282] loop4: p2 size 2 extends beyond EOD, truncated [ 1009.774986] overlayfs: failed to resolve './file1': -2 [ 1009.801970] loop4: p3 start 201 is beyond EOD, truncated 12:32:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{}, {r0, 0x8301}], 0x2, 0x0, 0x0, 0x0) [ 1009.825475] loop4: p4 start 301 is beyond EOD, truncated [ 1009.845925] loop4: p5 start 1 is beyond EOD, truncated [ 1009.852122] loop4: p6 start 1 is beyond EOD, truncated [ 1009.858884] loop4: p7 start 1 is beyond EOD, truncated [ 1009.864696] loop4: p8 start 1 is beyond EOD, truncated [ 1009.872061] loop4: p9 start 1 is beyond EOD, truncated [ 1009.880562] loop4: p10 start 1 is beyond EOD, truncated [ 1009.886221] loop4: p11 start 1 is beyond EOD, truncated [ 1009.892704] loop4: p12 start 1 is beyond EOD, truncated [ 1009.899906] loop4: p13 start 1 is beyond EOD, truncated [ 1009.911622] loop4: p14 start 1 is beyond EOD, truncated [ 1009.934020] loop4: p15 start 1 is beyond EOD, truncated [ 1009.966403] loop4: p16 start 1 is beyond EOD, truncated [ 1009.983540] loop4: p17 start 1 is beyond EOD, truncated [ 1009.995953] loop4: p18 start 1 is beyond EOD, truncated [ 1010.029155] loop4: p19 start 1 is beyond EOD, truncated [ 1010.055902] loop4: p20 start 1 is beyond EOD, truncated [ 1010.073134] loop4: p21 start 1 is beyond EOD, truncated [ 1010.073927] overlayfs: failed to resolve './file1': -2 [ 1010.098394] loop4: p22 start 1 is beyond EOD, truncated [ 1010.111699] loop4: p23 start 1 is beyond EOD, truncated [ 1010.126758] loop4: p24 start 1 is beyond EOD, truncated 12:32:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00'}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:21 executing program 2: gettid() getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, 0x0, &(0x7f0000000100)) socket$pppoe(0x18, 0x1, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25c", 0xb2}], 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r1, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r2 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000340), 0x8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000640)=ANY=[@ANYBLOB="2c008f3f2bb45e1294796b9c475893d17a373e3183134d65016e5e7f99055d430206fa5fb1dcae26a44f884fb4475ed77cff1b422041887c89e138cc73a22883a430e239012747d572130a1dcee1a4ab415d9f00aa24d99466b1a68fba1c5de7fad8da50cda0387dbb026460d2f7870caa5d6c02a383f7c8960f7206d5a12753f7405cfadf565fa695cbc31b502233b79617806e2ecc9cf5dc5e19537f21cbceb00279000000000088cbc23dbd3f88bb350c34"]) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000780)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x816}, 0xc, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000000000c000300a7090000000000000c000600030000000000000008000100000000000c0006000200000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="e7055d86493b3b5e67c1fea7bf6c23786d579ea2b9fdeca83e33a5fd168f17e307922a2baf725f49e5fd1bccbe3c1131e0c1daec033b9177af99b2b1783076558ac638d136df31cc0eb59dcbf6b3457ab03102f747ec9855fab291f3a6f431b1c0f93e3c9adeece2a4e06e9e000000000000"], 0x1) 12:32:21 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000140)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='se\x81urity.SMACK64IPIN\x00', 0x0, 0x0, 0x0) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1010.160994] loop4: p25 start 1 is beyond EOD, truncated [ 1010.170276] loop4: p26 start 1 is beyond EOD, truncated [ 1010.177502] loop4: p27 start 1 is beyond EOD, truncated [ 1010.193258] loop4: p28 start 1 is beyond EOD, truncated [ 1010.218603] loop4: p29 start 1 is beyond EOD, truncated [ 1010.236370] loop4: p30 start 1 is beyond EOD, truncated [ 1010.265443] loop4: p31 start 1 is beyond EOD, truncated [ 1010.274722] kauditd_printk_skb: 2 callbacks suppressed [ 1010.274736] audit: type=1804 audit(1547555541.798:1780): pid=27691 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/252/file0" dev="sda1" ino=17002 res=1 [ 1010.282924] loop4: p32 start 1 is beyond EOD, truncated [ 1010.342402] loop4: p33 start 1 is beyond EOD, truncated [ 1010.350122] loop4: p34 start 1 is beyond EOD, truncated [ 1010.357777] loop4: p35 start 1 is beyond EOD, truncated [ 1010.368656] loop4: p36 start 1 is beyond EOD, truncated [ 1010.376215] loop4: p37 start 1 is beyond EOD, truncated [ 1010.384823] loop4: p38 start 1 is beyond EOD, truncated [ 1010.393126] loop4: p39 start 1 is beyond EOD, truncated [ 1010.399766] overlayfs: failed to resolve './file1': -2 [ 1010.400187] loop4: p40 start 1 is beyond EOD, truncated [ 1010.412663] loop4: p41 start 1 is beyond EOD, truncated [ 1010.420550] loop4: p42 start 1 is beyond EOD, truncated [ 1010.427274] loop4: p43 start 1 is beyond EOD, truncated [ 1010.433660] loop4: p44 start 1 is beyond EOD, truncated [ 1010.460099] audit: type=1800 audit(1547555541.778:1779): pid=27687 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17002 res=0 [ 1010.502035] loop4: p45 start 1 is beyond EOD, truncated [ 1010.508888] loop4: p46 start 1 is beyond EOD, truncated [ 1010.530617] loop4: p47 start 1 is beyond EOD, truncated [ 1010.554913] loop4: p48 start 1 is beyond EOD, truncated [ 1010.568464] loop4: p49 start 1 is beyond EOD, truncated [ 1010.579777] loop4: p50 start 1 is beyond EOD, truncated [ 1010.595404] loop4: p51 start 1 is beyond EOD, truncated [ 1010.601006] loop4: p52 start 1 is beyond EOD, truncated [ 1010.608933] loop4: p53 start 1 is beyond EOD, truncated [ 1010.618625] loop4: p54 start 1 is beyond EOD, truncated [ 1010.626682] loop4: p55 start 1 is beyond EOD, truncated [ 1010.636748] loop4: p56 start 1 is beyond EOD, truncated [ 1010.645352] loop4: p57 start 1 is beyond EOD, truncated [ 1010.650907] loop4: p58 start 1 is beyond EOD, truncated [ 1010.660750] loop4: p59 start 1 is beyond EOD, truncated [ 1010.668558] loop4: p60 start 1 is beyond EOD, truncated [ 1010.678288] loop4: p61 start 1 is beyond EOD, truncated [ 1010.686132] loop4: p62 start 1 is beyond EOD, truncated [ 1010.695989] loop4: p63 start 1 is beyond EOD, truncated [ 1010.718934] loop4: p64 start 1 is beyond EOD, truncated [ 1010.733349] loop4: p65 start 1 is beyond EOD, truncated [ 1010.752759] loop4: p66 start 1 is beyond EOD, truncated [ 1010.774734] loop4: p67 start 1 is beyond EOD, truncated [ 1010.791484] loop4: p68 start 1 is beyond EOD, truncated [ 1010.808957] loop4: p69 start 1 is beyond EOD, truncated [ 1010.839027] loop4: p70 start 1 is beyond EOD, truncated [ 1010.847812] loop4: p71 start 1 is beyond EOD, truncated [ 1010.856155] loop4: p72 start 1 is beyond EOD, truncated [ 1010.864039] loop4: p73 start 1 is beyond EOD, truncated [ 1010.871224] loop4: p74 start 1 is beyond EOD, truncated [ 1010.881296] loop4: p75 start 1 is beyond EOD, truncated [ 1010.888478] loop4: p76 start 1 is beyond EOD, truncated [ 1010.897645] loop4: p77 start 1 is beyond EOD, truncated [ 1010.905321] loop4: p78 start 1 is beyond EOD, truncated [ 1010.913277] loop4: p79 start 1 is beyond EOD, truncated [ 1010.920955] loop4: p80 start 1 is beyond EOD, truncated [ 1010.929131] loop4: p81 start 1 is beyond EOD, truncated [ 1010.936812] loop4: p82 start 1 is beyond EOD, truncated [ 1010.943321] loop4: p83 start 1 is beyond EOD, truncated [ 1010.950546] loop4: p84 start 1 is beyond EOD, truncated [ 1010.959999] loop4: p85 start 1 is beyond EOD, truncated [ 1010.966155] loop4: p86 start 1 is beyond EOD, truncated [ 1010.973209] loop4: p87 start 1 is beyond EOD, truncated [ 1010.979584] loop4: p88 start 1 is beyond EOD, truncated [ 1010.987324] loop4: p89 start 1 is beyond EOD, truncated [ 1010.994807] loop4: p90 start 1 is beyond EOD, truncated [ 1011.002933] loop4: p91 start 1 is beyond EOD, truncated [ 1011.010684] loop4: p92 start 1 is beyond EOD, truncated [ 1011.021827] loop4: p93 start 1 is beyond EOD, truncated [ 1011.029283] loop4: p94 start 1 is beyond EOD, truncated [ 1011.037915] loop4: p95 start 1 is beyond EOD, truncated [ 1011.045672] loop4: p96 start 1 is beyond EOD, truncated [ 1011.053063] loop4: p97 start 1 is beyond EOD, truncated [ 1011.059511] loop4: p98 start 1 is beyond EOD, truncated [ 1011.081988] loop4: p99 start 1 is beyond EOD, truncated [ 1011.104881] loop4: p100 start 1 is beyond EOD, truncated [ 1011.110351] loop4: p101 start 1 is beyond EOD, truncated [ 1011.147691] loop4: p102 start 1 is beyond EOD, truncated [ 1011.163948] loop4: p103 start 1 is beyond EOD, truncated [ 1011.177452] loop4: p104 start 1 is beyond EOD, truncated [ 1011.183827] loop4: p105 start 1 is beyond EOD, truncated [ 1011.208461] loop4: p106 start 1 is beyond EOD, truncated [ 1011.219565] loop4: p107 start 1 is beyond EOD, truncated [ 1011.232906] loop4: p108 start 1 is beyond EOD, truncated [ 1011.238741] loop4: p109 start 1 is beyond EOD, truncated [ 1011.249657] loop4: p110 start 1 is beyond EOD, truncated [ 1011.255317] loop4: p111 start 1 is beyond EOD, truncated [ 1011.260854] loop4: p112 start 1 is beyond EOD, truncated [ 1011.277609] loop4: p113 start 1 is beyond EOD, truncated [ 1011.288451] loop4: p114 start 1 is beyond EOD, truncated [ 1011.312616] loop4: p115 start 1 is beyond EOD, truncated [ 1011.318155] loop4: p116 start 1 is beyond EOD, truncated [ 1011.332497] loop4: p117 start 1 is beyond EOD, truncated [ 1011.338037] loop4: p118 start 1 is beyond EOD, truncated [ 1011.349982] loop4: p119 start 1 is beyond EOD, truncated [ 1011.357055] loop4: p120 start 1 is beyond EOD, truncated [ 1011.365360] loop4: p121 start 1 is beyond EOD, truncated [ 1011.370905] loop4: p122 start 1 is beyond EOD, truncated [ 1011.376601] loop4: p123 start 1 is beyond EOD, truncated [ 1011.382189] loop4: p124 start 1 is beyond EOD, truncated [ 1011.387640] loop4: p125 start 1 is beyond EOD, truncated [ 1011.393141] loop4: p126 start 1 is beyond EOD, truncated [ 1011.399553] loop4: p127 start 1 is beyond EOD, truncated [ 1011.410698] loop4: p128 start 1 is beyond EOD, truncated [ 1011.416892] loop4: p129 start 1 is beyond EOD, truncated [ 1011.422528] loop4: p130 start 1 is beyond EOD, truncated [ 1011.428021] loop4: p131 start 1 is beyond EOD, truncated [ 1011.433600] loop4: p132 start 1 is beyond EOD, truncated [ 1011.439039] loop4: p133 start 1 is beyond EOD, truncated [ 1011.444547] loop4: p134 start 1 is beyond EOD, truncated [ 1011.449994] loop4: p135 start 1 is beyond EOD, truncated [ 1011.456041] loop4: p136 start 1 is beyond EOD, truncated [ 1011.461556] loop4: p137 start 1 is beyond EOD, truncated [ 1011.467004] loop4: p138 start 1 is beyond EOD, truncated [ 1011.472783] loop4: p139 start 1 is beyond EOD, truncated [ 1011.478227] loop4: p140 start 1 is beyond EOD, truncated [ 1011.483743] loop4: p141 start 1 is beyond EOD, truncated [ 1011.489197] loop4: p142 start 1 is beyond EOD, truncated [ 1011.494698] loop4: p143 start 1 is beyond EOD, truncated [ 1011.500178] loop4: p144 start 1 is beyond EOD, truncated [ 1011.505680] loop4: p145 start 1 is beyond EOD, truncated [ 1011.511126] loop4: p146 start 1 is beyond EOD, truncated [ 1011.517427] loop4: p147 start 1 is beyond EOD, truncated [ 1011.522962] loop4: p148 start 1 is beyond EOD, truncated [ 1011.528415] loop4: p149 start 1 is beyond EOD, truncated [ 1011.533940] loop4: p150 start 1 is beyond EOD, truncated [ 1011.539393] loop4: p151 start 1 is beyond EOD, truncated [ 1011.544902] loop4: p152 start 1 is beyond EOD, truncated [ 1011.550346] loop4: p153 start 1 is beyond EOD, truncated [ 1011.555835] loop4: p154 start 1 is beyond EOD, truncated [ 1011.561281] loop4: p155 start 1 is beyond EOD, truncated [ 1011.566780] loop4: p156 start 1 is beyond EOD, truncated [ 1011.572266] loop4: p157 start 1 is beyond EOD, truncated [ 1011.577726] loop4: p158 start 1 is beyond EOD, truncated [ 1011.584077] loop4: p159 start 1 is beyond EOD, truncated [ 1011.589536] loop4: p160 start 1 is beyond EOD, truncated [ 1011.595055] loop4: p161 start 1 is beyond EOD, truncated [ 1011.600503] loop4: p162 start 1 is beyond EOD, truncated [ 1011.606047] loop4: p163 start 1 is beyond EOD, truncated [ 1011.611933] loop4: p164 start 1 is beyond EOD, truncated [ 1011.617379] loop4: p165 start 1 is beyond EOD, truncated [ 1011.622871] loop4: p166 start 1 is beyond EOD, truncated [ 1011.628315] loop4: p167 start 1 is beyond EOD, truncated [ 1011.633794] loop4: p168 start 1 is beyond EOD, truncated [ 1011.639255] loop4: p169 start 1 is beyond EOD, truncated [ 1011.644766] loop4: p170 start 1 is beyond EOD, truncated [ 1011.650218] loop4: p171 start 1 is beyond EOD, truncated [ 1011.655749] loop4: p172 start 1 is beyond EOD, truncated [ 1011.661198] loop4: p173 start 1 is beyond EOD, truncated [ 1011.666702] loop4: p174 start 1 is beyond EOD, truncated [ 1011.672239] loop4: p175 start 1 is beyond EOD, truncated [ 1011.677697] loop4: p176 start 1 is beyond EOD, truncated [ 1011.683200] loop4: p177 start 1 is beyond EOD, truncated [ 1011.688651] loop4: p178 start 1 is beyond EOD, truncated [ 1011.694154] loop4: p179 start 1 is beyond EOD, truncated [ 1011.699603] loop4: p180 start 1 is beyond EOD, truncated [ 1011.705104] loop4: p181 start 1 is beyond EOD, truncated [ 1011.710551] loop4: p182 start 1 is beyond EOD, truncated [ 1011.716527] loop4: p183 start 1 is beyond EOD, truncated [ 1011.722043] loop4: p184 start 1 is beyond EOD, truncated [ 1011.727491] loop4: p185 start 1 is beyond EOD, truncated [ 1011.732972] loop4: p186 start 1 is beyond EOD, truncated [ 1011.738435] loop4: p187 start 1 is beyond EOD, truncated [ 1011.743944] loop4: p188 start 1 is beyond EOD, truncated [ 1011.749409] loop4: p189 start 1 is beyond EOD, truncated [ 1011.754905] loop4: p190 start 1 is beyond EOD, truncated [ 1011.760361] loop4: p191 start 1 is beyond EOD, truncated [ 1011.765853] loop4: p192 start 1 is beyond EOD, truncated [ 1011.771321] loop4: p193 start 1 is beyond EOD, truncated [ 1011.776811] loop4: p194 start 1 is beyond EOD, truncated [ 1011.782308] loop4: p195 start 1 is beyond EOD, truncated [ 1011.787771] loop4: p196 start 1 is beyond EOD, truncated [ 1011.793250] loop4: p197 start 1 is beyond EOD, truncated [ 1011.798704] loop4: p198 start 1 is beyond EOD, truncated [ 1011.804209] loop4: p199 start 1 is beyond EOD, truncated [ 1011.809664] loop4: p200 start 1 is beyond EOD, truncated [ 1011.815176] loop4: p201 start 1 is beyond EOD, truncated [ 1011.820627] loop4: p202 start 1 is beyond EOD, truncated [ 1011.826125] loop4: p203 start 1 is beyond EOD, truncated [ 1011.831645] loop4: p204 start 1 is beyond EOD, truncated [ 1011.837098] loop4: p205 start 1 is beyond EOD, truncated [ 1011.843471] loop4: p206 start 1 is beyond EOD, truncated [ 1011.849181] loop4: p207 start 1 is beyond EOD, truncated [ 1011.854674] loop4: p208 start 1 is beyond EOD, truncated [ 1011.860139] loop4: p209 start 1 is beyond EOD, truncated [ 1011.865658] loop4: p210 start 1 is beyond EOD, truncated [ 1011.871107] loop4: p211 start 1 is beyond EOD, truncated [ 1011.876587] loop4: p212 start 1 is beyond EOD, truncated [ 1011.882082] loop4: p213 start 1 is beyond EOD, truncated [ 1011.887528] loop4: p214 start 1 is beyond EOD, truncated [ 1011.893006] loop4: p215 start 1 is beyond EOD, truncated [ 1011.898460] loop4: p216 start 1 is beyond EOD, truncated [ 1011.903969] loop4: p217 start 1 is beyond EOD, truncated [ 1011.909443] loop4: p218 start 1 is beyond EOD, truncated [ 1011.914939] loop4: p219 start 1 is beyond EOD, truncated [ 1011.920389] loop4: p220 start 1 is beyond EOD, truncated [ 1011.925878] loop4: p221 start 1 is beyond EOD, truncated [ 1011.931326] loop4: p222 start 1 is beyond EOD, truncated [ 1011.936830] loop4: p223 start 1 is beyond EOD, truncated [ 1011.942340] loop4: p224 start 1 is beyond EOD, truncated [ 1011.947788] loop4: p225 start 1 is beyond EOD, truncated [ 1011.953283] loop4: p226 start 1 is beyond EOD, truncated [ 1011.958750] loop4: p227 start 1 is beyond EOD, truncated [ 1011.964248] loop4: p228 start 1 is beyond EOD, truncated [ 1011.969700] loop4: p229 start 1 is beyond EOD, truncated [ 1011.975730] loop4: p230 start 1 is beyond EOD, truncated [ 1011.981169] loop4: p231 start 1 is beyond EOD, truncated [ 1011.986678] loop4: p232 start 1 is beyond EOD, truncated [ 1011.992457] loop4: p233 start 1 is beyond EOD, truncated [ 1011.997904] loop4: p234 start 1 is beyond EOD, truncated [ 1012.003396] loop4: p235 start 1 is beyond EOD, truncated [ 1012.008856] loop4: p236 start 1 is beyond EOD, truncated [ 1012.014338] loop4: p237 start 1 is beyond EOD, truncated [ 1012.019789] loop4: p238 start 1 is beyond EOD, truncated [ 1012.025294] loop4: p239 start 1 is beyond EOD, truncated [ 1012.030737] loop4: p240 start 1 is beyond EOD, truncated [ 1012.036217] loop4: p241 start 1 is beyond EOD, truncated [ 1012.041717] loop4: p242 start 1 is beyond EOD, truncated [ 1012.047171] loop4: p243 start 1 is beyond EOD, truncated [ 1012.052672] loop4: p244 start 1 is beyond EOD, truncated [ 1012.058138] loop4: p245 start 1 is beyond EOD, truncated [ 1012.063640] loop4: p246 start 1 is beyond EOD, truncated [ 1012.069082] loop4: p247 start 1 is beyond EOD, truncated [ 1012.074590] loop4: p248 start 1 is beyond EOD, truncated [ 1012.080035] loop4: p249 start 1 is beyond EOD, truncated [ 1012.085534] loop4: p250 start 1 is beyond EOD, truncated [ 1012.090979] loop4: p251 start 1 is beyond EOD, truncated [ 1012.096477] loop4: p252 start 1 is beyond EOD, truncated [ 1012.102862] loop4: p253 start 1 is beyond EOD, truncated [ 1012.108307] loop4: p254 start 1 is beyond EOD, truncated [ 1012.113809] loop4: p255 start 1 is beyond EOD, truncated 12:32:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) accept(0xffffffffffffff9c, 0x0, 0x0) 12:32:23 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) 12:32:23 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:23 executing program 2: 12:32:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00'}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:23 executing program 5: 12:32:23 executing program 5: 12:32:23 executing program 2: [ 1012.289271] audit: type=1800 audit(1547555543.808:1781): pid=27715 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17499 res=0 12:32:23 executing program 1: [ 1012.330249] audit: type=1804 audit(1547555543.838:1782): pid=27715 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/253/file0" dev="sda1" ino=17499 res=1 12:32:23 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 1012.402347] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 12:32:24 executing program 5: 12:32:24 executing program 2: [ 1012.475342] print_req_error: 1 callbacks suppressed [ 1012.475353] print_req_error: I/O error, dev loop4, sector 0 flags 80700 [ 1012.525210] print_req_error: I/O error, dev loop4, sector 0 flags 0 [ 1012.531886] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1012.541077] print_req_error: I/O error, dev loop4, sector 0 flags 0 [ 1012.547931] Buffer I/O error on dev loop4p2, logical block 0, async page read [ 1012.606302] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 1012.739996] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 12:32:24 executing program 4: 12:32:24 executing program 1: 12:32:24 executing program 2: 12:32:24 executing program 5: 12:32:24 executing program 1: 12:32:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:24 executing program 5: 12:32:24 executing program 2: 12:32:24 executing program 4: 12:32:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:24 executing program 4: 12:32:24 executing program 5: 12:32:24 executing program 1: clock_nanosleep(0x0, 0x0, 0x0, &(0x7f0000000040)) 12:32:24 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) [ 1013.402526] audit: type=1800 audit(1547555544.928:1783): pid=27756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17028 res=0 12:32:25 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:25 executing program 5: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x801, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) 12:32:25 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x301186, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="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", 0xfd, 0xfffffffffffffff8) keyctl$setperm(0x5, r1, 0x7ffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) 12:32:25 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)='ramfs\x00', 0x400, 0x0) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/233) [ 1013.488725] audit: type=1804 audit(1547555544.948:1784): pid=27756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/254/file0" dev="sda1" ino=17028 res=1 12:32:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000000004efffffdfffffffff000000000000"], 0x14}}, 0x0) 12:32:25 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:25 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='lo\x00', 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x1f) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 12:32:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x301186, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="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", 0xfd, 0xfffffffffffffff8) keyctl$setperm(0x5, r1, 0x7ffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) 12:32:25 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x4000000000013, &(0x7f0000000180), 0x3b2) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000080)=0x1, 0x4) ioctl$int_in(r3, 0x5421, &(0x7f0000000000)=0xe30) sendmmsg(r3, &(0x7f0000001380)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)='M', 0x1}, {0x0}], 0x2}, 0x7}], 0x1, 0x4000001) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 12:32:25 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) [ 1014.347996] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:32:25 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:26 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000240)) [ 1014.443191] audit: type=1800 audit(1547555545.968:1785): pid=27807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17492 res=0 [ 1014.470459] audit: type=1804 audit(1547555545.988:1786): pid=27807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/255/file0" dev="sda1" ino=17492 res=1 12:32:26 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:26 executing program 2: socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x44, 0x5}}}}}, &(0x7f0000000040)) 12:32:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000340)=0x3) 12:32:26 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:26 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'syzkaller1\x00', 0x200}) 12:32:26 executing program 2: r0 = socket(0x11, 0x802, 0x0) connect$inet(r0, 0x0, 0x0) 12:32:26 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1014.951534] net_ratelimit: 18 callbacks suppressed [ 1014.951542] protocol 88fb is buggy, dev hsr_slave_0 [ 1014.956554] protocol 88fb is buggy, dev hsr_slave_1 [ 1014.966693] protocol 88fb is buggy, dev hsr_slave_0 [ 1014.966744] protocol 88fb is buggy, dev hsr_slave_1 12:32:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0xfff) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) 12:32:26 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:32:26 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x301186, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="ab", 0x1, 0xfffffffffffffff8) keyctl$setperm(0x5, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 12:32:26 executing program 2: clone(0x421020017fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) rt_sigreturn() request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='em1ppp0system\\\x00', 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="58565ff7c3526ff1e7da40355f734502e46e8c81706daf88f7828a679128911e64f7022454155f2950642efd78fa51475df632d9fe1194a741b90f947f46a901b3165334908bb5c8232d8d30170df774731b20e5f7cf3062f787d706b3", 0x5d, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={0x0, 0x0, r2}, 0x0, 0x0, 0x0) 12:32:26 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:32:26 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6_vti0\x00', 0x4001}) 12:32:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:26 executing program 2: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') symlink(0x0, 0x0) umount2(&(0x7f0000000180)='../file0\x00', 0x0) [ 1015.511517] protocol 88fb is buggy, dev hsr_slave_0 [ 1015.516861] protocol 88fb is buggy, dev hsr_slave_1 [ 1015.522020] protocol 88fb is buggy, dev hsr_slave_0 [ 1015.527082] protocol 88fb is buggy, dev hsr_slave_1 [ 1015.532229] protocol 88fb is buggy, dev hsr_slave_0 [ 1015.535029] audit: type=1800 audit(1547555547.058:1787): pid=27858 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16488 res=0 12:32:27 executing program 1: mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:27 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:32:27 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)="6f5735fe93ad04011d3273c61a6f48f5fcbf39c7effd2b84f223bde879513d244e6033d576b9e713e62f32f037d0b4eb94e7570294dbd480db89cfe45248583fdd239362d210c39df381031da90361afb41332d73fa0d5b4e7239c17acec760ea0830c6af824f1000743de9e101a696233536628f24abe7b93e2f36a174951cb6a62b47c6b1d03bb04dac80b635cf36d33a25c3e73742105f6ea9138f7e30c17e7e9a5fcc397e0808598a4f9917f5acd7819fcf988826251e4a8662fe10606d3c223c8c4cb2c67f13f2d72b1ba94bed233d3e782f78f631344ccece6054badd97c6271cebe24c971a076ca6679022a50a8c0750c75", 0xf5, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="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", 0xfd, 0xfffffffffffffff8) keyctl$setperm(0x5, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) [ 1015.537317] protocol 88fb is buggy, dev hsr_slave_1 12:32:27 executing program 2: syz_genetlink_get_family_id$nbd(0x0) [ 1015.714645] audit: type=1804 audit(1547555547.088:1788): pid=27858 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/256/file0" dev="sda1" ino=16488 res=1 12:32:27 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:27 executing program 1: mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x301186, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="ab", 0x1, 0xfffffffffffffff8) keyctl$setperm(0x5, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 12:32:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)) 12:32:27 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:27 executing program 1: mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:28 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x400000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x9, &(0x7f00000002c0)="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", 0xf7e) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)=0x200) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) getpid() r1 = getpid() sched_getaffinity(0x0, 0x8, &(0x7f0000000000)) r2 = open(&(0x7f0000000280)='./bus\x00', 0x4000141042, 0x0) r3 = add_key(&(0x7f00000012c0)='encrypted\x00', &(0x7f0000001300)={'syz', 0x1}, &(0x7f0000001340)="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", 0x1000, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000001240)={'syz', 0x0}, &(0x7f0000001280)="250be2cd911ddbe6487fb1d5caf1562b3f03e118", 0x14, r3) sched_rr_get_interval(r1, &(0x7f0000002340)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r2, 0x1, 0x0, 0x10000101) setpriority(0x0, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) syz_open_pts(r4, 0x0) 12:32:28 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)="6f5735fe93ad04011d3273c61a6f48f5fcbf39c7effd2b84f223bde879513d244e6033d576b9e713e62f32f037d0b4eb94e7570294dbd480db89cfe45248583fdd239362d210c39df381031da90361afb41332d73fa0d5b4e7239c17acec760ea0830c6af824f1000743de9e101a696233536628f24abe7b93e2f36a174951cb6a62b47c6b1d03bb04dac80b635cf36d33a25c3e73742105f6ea9138f7e30c17e7e9a5fcc397e0808598a4f9917f5acd7819fcf988826251e4a8662fe10606d3c223c8c4cb2c67f13f2d72b1ba94bed233d3e782f78f631344ccece6054badd97c6271cebe24c971a076ca6679022a50a8c0750c75", 0xf5, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="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", 0xfd, 0xfffffffffffffff8) keyctl$setperm(0x5, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 12:32:28 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:28 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:28 executing program 4: clone(0x421020017fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) rt_sigreturn() request_key(&(0x7f0000000000)='.request_key_auth\x00', 0x0, &(0x7f0000000080)='em1ppp0system\\\x00', 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 12:32:28 executing program 4: 12:32:28 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1016.650017] audit: type=1800 audit(1547555548.168:1789): pid=27911 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16513 res=0 12:32:28 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:28 executing program 4: [ 1016.789440] audit: type=1804 audit(1547555548.198:1790): pid=27911 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/257/file0" dev="sda1" ino=16513 res=1 12:32:28 executing program 2: 12:32:28 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:29 executing program 4: 12:32:29 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)="6f5735fe93ad04011d3273c61a6f48f5fcbf39c7effd2b84f223bde879513d244e6033d576b9e713e62f32f037d0b4eb94e7570294dbd480db89cfe45248583fdd239362d210c39df381031da90361afb41332d73fa0d5b4e7239c17acec760ea0830c6af824f1000743de9e101a696233536628f24abe7b93e2f36a174951cb6a62b47c6b1d03bb04dac80b635cf36d33a25c3e73742105f6ea9138f7e30c17e7e9a5fcc397e0808598a4f9917f5acd7819fcf988826251e4a8662fe10606d3c223c8c4cb2c67f13f2d72b1ba94bed233d3e782f78f631344ccece6054badd97c6271cebe24c971a076ca6679022a50a8c0750c75", 0xf5, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="ab6d4862a2b77c4be59256b8b500a342bbd311d9cc1783a3f080be0b989262bc0bf097ea37986ba24adcb04c74087732eb520751b79f1f86efba447294a9d094043b7cc798466d05e034d4cc191fd560f8604b331f4512d82dd6126fef361defc80d03e0ceb15f357d1803beaba8b226152a32c57da59d2b08ad819be0d7f1e33691db6be05874015774b713d160dbb2b6c8ecbe88b85e0cf72f9d2078edfb0e0c629bf9d51d6ad9eea3cf33ad1c3cef8b01e722114399adb47e5461514b39a1a7105a974462855ab4b63aa2a0e68664d3c375aa8b152025936e55d061383aa0179226a779d718097f209c6e2e25a9bf19ebbd01faaffff4fe174f82e1", 0xfd, 0xfffffffffffffff8) keyctl$setperm(0x5, r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_trie\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 12:32:29 executing program 2: 12:32:29 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:29 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:29 executing program 2: 12:32:29 executing program 4: 12:32:29 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1017.662024] audit: type=1800 audit(1547555549.188:1791): pid=27943 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17518 res=0 12:32:29 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:29 executing program 2: 12:32:29 executing program 4: [ 1017.788854] audit: type=1804 audit(1547555549.188:1792): pid=27943 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/258/file0" dev="sda1" ino=17518 res=1 12:32:30 executing program 2: 12:32:30 executing program 5: 12:32:30 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:30 executing program 4: 12:32:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000340)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000140)={0x7e}) 12:32:30 executing program 2: socketpair$unix(0x1, 0x400000200000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000110007031dff05000000000007000a0008000000001d85680c1ba3a20400ff7e280000001100ffffba16a0ad21d8d3a3cd5467b4603faeaa1c0009b3ebea8653b1cc7e63975c0ac4", 0x4c}], 0x1}, 0x0) 12:32:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000340)=0x3) 12:32:30 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', 0x0, 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 1018.695711] audit: type=1800 audit(1547555550.218:1793): pid=27970 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16663 res=0 [ 1018.786626] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 12:32:30 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', 0x0, 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1018.848045] audit: type=1804 audit(1547555550.258:1794): pid=27970 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/259/file0" dev="sda1" ino=16663 res=1 12:32:30 executing program 2: r0 = open(0x0, 0x202c1, 0x0) fallocate(r0, 0x800000011, 0x0, 0x100000000) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000000c0)=""/3) symlinkat(&(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00') fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000001c0)) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0x9, @remote, 0xa8b8}, 0x1c) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) sendmsg$nl_generic(r1, &(0x7f0000001400)={0x0, 0x4c00007e, &(0x7f00000013c0)={&(0x7f0000000100)={0x14, 0x17, 0x101, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x7) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee61, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000000)=[0x2, 0x6]) 12:32:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:30 executing program 5: r0 = open(0x0, 0x202c1, 0x0) fallocate(r0, 0x800000011, 0x0, 0x100000000) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000000c0)=""/3) symlinkat(&(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00') fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000001c0)) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0x9, @remote, 0xa8b8}, 0x1c) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r1, &(0x7f0000001400)={0x0, 0x4c00007e, &(0x7f00000013c0)={&(0x7f0000000100)={0x14, 0x17, 0x101, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) pipe(&(0x7f0000000380)) 12:32:30 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', 0x0, 0x801, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'eql\x00', 0x803}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu}) 12:32:31 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:31 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x41) ioctl$int_in(r1, 0x80000040045010, &(0x7f0000000000)) 12:32:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:31 executing program 5: stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000240)=@v3={0x3000000, [{0x5, 0x8001}, {0x0, 0x3}], r0}, 0x18, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000280)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0xc2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x276) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x4000a, 0x0, 0xffffffffffffffff}, 0x19f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x40, &(0x7f0000001fde), 0x4) 12:32:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8040, &(0x7f0000001640)={[{@uid={'uid'}}, {@check_strict='check=strict'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@map_normal='map=normal'}, {@norock='norock'}, {@block={'block'}}, {@mode={'mode', 0x3d, 0xf7}}, {@sbsector={'sbsector', 0x3d, 0x7fffffff}}], [{@subj_type={'subj_type'}}, {@subj_role={'subj_role', 0x3d, '/dev/rtc0\x00'}}, {@subj_role={'subj_role', 0x3d, '/dev/rtc0\x00'}}, {@subj_user={'subj_user'}}, {@fowner_gt={'fowner>'}}]}) 12:32:31 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:31 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x6, 0x0, 0x3, 0xa0, r4}, 0x10) write(r3, &(0x7f0000000340), 0x10000014c) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:32:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000280)=""/240, 0xd932}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) [ 1019.728718] audit: type=1800 audit(1547555551.248:1795): pid=28025 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17046 res=0 [ 1019.756439] audit: type=1804 audit(1547555551.278:1796): pid=28025 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/260/file0" dev="sda1" ino=17046 res=1 12:32:31 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:31 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x6, 0x8000, 0x3, 0xa0}, 0x10) write(r3, &(0x7f0000000340), 0x10000014c) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) stat(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) 12:32:31 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x0, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) 12:32:31 executing program 2: 12:32:31 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(0x0, 0x0) 12:32:31 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:32 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(0x0, 0x0) 12:32:32 executing program 2: 12:32:32 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:32 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x6, 0x0, 0x3, 0xa0, r4}, 0x10) write(r3, &(0x7f0000000340), 0x10000014c) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:32:32 executing program 2: 12:32:32 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000800)='ramfs\x00', 0x801, 0x0) chmod(0x0, 0x0) [ 1020.932644] audit: type=1804 audit(1547555552.448:1798): pid=28080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/261/file0" dev="sda1" ino=17707 res=1 12:32:32 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x6, 0x8000, 0x3, 0xa0}, 0x10) write(r3, &(0x7f0000000340), 0x10000014c) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) stat(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) 12:32:32 executing program 2: [ 1021.031780] audit: type=1800 audit(1547555552.448:1797): pid=28076 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17707 res=0 12:32:32 executing program 1: 12:32:32 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:32 executing program 2: [ 1021.191499] net_ratelimit: 14 callbacks suppressed [ 1021.191507] protocol 88fb is buggy, dev hsr_slave_0 [ 1021.201627] protocol 88fb is buggy, dev hsr_slave_1 [ 1021.206792] protocol 88fb is buggy, dev hsr_slave_0 [ 1021.211893] protocol 88fb is buggy, dev hsr_slave_1 12:32:32 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) close(0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) readv(r1, &(0x7f0000000180)=[{&(0x7f0000001200)=""/4096, 0xfffffe19}], 0x1) 12:32:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0xe, 0x0, &(0x7f00000004c0)="1fd4348999edc6cc07e743d87f13", 0x0, 0x10000}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000800)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000000980)=""/239, 0xef}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x3, &(0x7f0000001a80)=""/143, 0x8f}, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000480)={r2, 0x1, 0x6, @local}, 0x10) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000001b80)={0x0, &(0x7f0000001b40)}, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@local}, &(0x7f0000000080)=0x14) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) 12:32:33 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 1021.751466] protocol 88fb is buggy, dev hsr_slave_0 [ 1021.756682] protocol 88fb is buggy, dev hsr_slave_1 [ 1021.761825] protocol 88fb is buggy, dev hsr_slave_0 [ 1021.766883] protocol 88fb is buggy, dev hsr_slave_1 [ 1021.771997] protocol 88fb is buggy, dev hsr_slave_0 [ 1021.777059] protocol 88fb is buggy, dev hsr_slave_1 12:32:33 executing program 1: 12:32:33 executing program 2: 12:32:33 executing program 4: 12:32:33 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:33 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x6, 0x8000, 0x3, 0xa0}, 0x10) write(r3, &(0x7f0000000340), 0x10000014c) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) stat(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) 12:32:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:33 executing program 4: 12:32:33 executing program 1: 12:32:33 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000040)={0x0}) [ 1022.126638] audit: type=1800 audit(1547555553.638:1799): pid=28119 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16673 res=0 12:32:33 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000300)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f0000000440)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xffffffffffffff36) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xffffff45) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000001c0)=@generic={0x3, 0x4bc7b0e2, 0x2}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000500)='./file2\x00', 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000380)=0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) fcntl$getownex(r1, 0x10, 0x0) sched_setscheduler(r5, 0x2, &(0x7f00000004c0)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000480)) mknod$loop(&(0x7f0000001c40)='./file2\x00', 0x8003, 0x1) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) syncfs(0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) futex(&(0x7f0000000040), 0xb, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r6 = getpid() mmap(&(0x7f0000adb000/0x2000)=nil, 0x2000, 0x0, 0x1030, r0, 0x0) keyctl$join(0x1, &(0x7f00000003c0)={'syz', 0x2}) sched_setscheduler(r6, 0x5, &(0x7f0000000040)) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x0, &(0x7f0000c87000/0x2000)=nil) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000400)={'nlmon0\x00', {0x2, 0x4e24, @remote}}) getpid() 12:32:33 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x8000, 0x86138) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x100000041, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="fa1204a49155ce1e0002", 0xa}], 0x1, 0x0) pwritev(r0, &(0x7f0000002380)=[{&(0x7f0000001200)="692d0825001f3e3c3ee45ea1ad121ec1cc3bc2d92dc2bb78512d43e985942562398f681e1c5a17870108aeada35ab29f925375d09b22368d9774be7bf9c2cea443e6dc3d31b70f1e538ae4f1204ec2145df699869294fb1e7ae28031c203952a4c9a6af5926334eefba653872508a647ab0f0dddfcd0c826cadae61b1fb93ecacea45c343637bd0e24d4b23773fe4cdc86ca65375170ff0eaf4dc1607377bca193280ae44caaf2d870c26ae35bc2adad6269ca0df462e7a69998e0f93ca7a2c327c39ef6d2bfe68a3be3653fa70da5040e91ea8ccda01c79874cf370ed3169656eaed82f02256eb8bda2802802a5bcad0da408e9dddc648034e8c33881f1ce9dbb71cbc80ba8ed2cc466795cab03774d4d485ec28b3d482d536e3b6536ff4377ee8f4905eaf731f75a80f5802f20f05d54101014796902ec3e99a59caafc2f1ff2e1952479c51c4388f5a924ddec3af363ab608b9b5d56b70b0ba0f43ad8c14edcfec2e854ed604186d74217044e961892aa5ab865b2d19a477d3f241a648afb4e6e99d5b7e6e5bf8c4cedf64c46a34a6fb5c20f72817ba0cf7703f185e1cbe671b950efdd5de98da958fe073b8d63d73f596dcc2f7a6fcd43899d5e2d743e308fbd852830afe30daf1b8371494ebe24c2072f43eeee48dddc266d481ceb6584ab8297690599722f6c44541967663a8eae02cba34dd0ea3d569ba356f87d210b16e02a76895e800b94c4080341c08e833a12eecd910c93d86e82cf4df64916d555797c2b4cab65da0c87d4a1de23e4f3ae48ce1a7a1503442a939ba90c5e6001601ce024f78519838e15254deda121e40a0ab4b7f66bfd51a6b088b0261c88a3206cd161aada99959c6aad4e06589a8e899ed7f0aa0f66b26fcac1c7ab2ab1cfa7fbc977127d39d3a3f52be27fcc031c4ec33e34f7ee747c334bc8e7b81beae7314cf3f4c7819fcf2ab369243f48f529dd0a40e384d87b636f2a8ac10ad0b7af71a94e003064696b749611c267d4bcea3f9d9b82f9f8d6aee79536a22a88188dc91e3c667babfc6db18e5de04768c7eb4e10bae8d905a7217c2ea4c7902408cdb6b9e7174e40a95b00c07eff19a62a8374e0ed1fd8710519a475bd45aae483b547d808c08d7797cfbbd3c2765b9b4e246740054acb6824ec2700f7c1d2488952a18678d040e9cdc1e6aabb9e4ec90b6ea66905bd005b064d6b524ea73ebb3edd56d6d2bf5fe397c2b7200d33b39d6ad5ec7f2e5c9ff207ed03d7cfe34e49d0881ed3a4c2e7dc07c032644af0e89b8706e0b70f42e01569776c4892d5dfafecf6fee4e8b7f91331fd72dd70a6d4f30e4d9291d78e511d39aadacba8a3fd0196d128a0f395d0e41a023bb2418e10a1e94a5acc62b4b201feb0e9b3bb2b26f1cf0a58d8725269deb763fbd58b82e8ced288428c2eaee7f74ccce5b57fe3c2134f39a49f009745c292507a7b35e055f4fb472624851692bd0dece59d1fac7458d6b941fa091ecfbc7eb43427e60694690845bc771cf6aed65473f6291cde62c01ff9a7ffa90be33d9791307c195f280cd638556c2ac5a12b26245c8a01b41b6fd4224ed0df8f1c80679b1274558f67cc3f79ef44a363ccf3bb0644876e037dca73bf4f68ab7a0704cd1474d878ae07323d7fd1eced", 0x493}], 0x1, 0x0) [ 1022.170030] audit: type=1804 audit(1547555553.678:1800): pid=28119 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/262/file0" dev="sda1" ino=16673 res=1 12:32:33 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) close(r0) 12:32:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:34 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000002000/0x400000)=nil, 0x400000}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r1, 0xffffffffffffffbd, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") 12:32:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:34 executing program 5: 12:32:34 executing program 2: 12:32:34 executing program 1: 12:32:34 executing program 5: 12:32:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:34 executing program 4: 12:32:34 executing program 5: 12:32:34 executing program 4: [ 1023.413640] audit: type=1800 audit(1547555554.928:1801): pid=28173 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16689 res=0 12:32:35 executing program 1: 12:32:35 executing program 2: 12:32:35 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 1023.452717] audit: type=1804 audit(1547555554.958:1802): pid=28173 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/263/file0" dev="sda1" ino=16689 res=1 12:32:35 executing program 4: 12:32:35 executing program 5: 12:32:35 executing program 2: 12:32:35 executing program 1: 12:32:35 executing program 4: 12:32:35 executing program 2: 12:32:35 executing program 5: 12:32:35 executing program 1: 12:32:35 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:35 executing program 4: 12:32:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:35 executing program 4: 12:32:35 executing program 1: 12:32:35 executing program 2: 12:32:35 executing program 5: [ 1024.417556] audit: type=1800 audit(1547555555.938:1803): pid=28204 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16658 res=0 12:32:36 executing program 2: 12:32:36 executing program 4: 12:32:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008910, &(0x7f0000000040)) 12:32:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) [ 1024.508639] audit: type=1804 audit(1547555555.988:1804): pid=28204 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/264/file0" dev="sda1" ino=16658 res=1 12:32:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x4, 0x4, 0x40}, 0x2c) 12:32:36 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$getown(r0, 0x9) getdents(r1, &(0x7f0000000280)=""/135, 0x74f) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}, 0x0) pread64(r1, &(0x7f00000005c0)=""/178, 0xb2, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x40, 0x0) close(r2) r3 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x3fa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000000c0), &(0x7f0000000d40)=ANY=[@ANYBLOB="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"]}, 0x472) readv(0xffffffffffffffff, &(0x7f0000000040), 0x0) readv(r3, &(0x7f0000000180)=[{&(0x7f0000001200)=""/4096, 0xfffffe19}], 0x1) 12:32:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x48000, 0x0) 12:32:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000005000600000000000a00000000000004000000000000000000000021000000000001000000000000020001000100000000000002000500ebffffff0a004872bbb6896209000000000000009aec3f3f7710aa000000ff17004000000000000000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40002ee, 0x0) 12:32:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000005000600000000000a00000000000004000000000000000000000021000000000001000000000000020001000100000000000002000500ebffffff0a004872bbb6896209000000000000009aec3f3f7710aa000000ff17004000000000000000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40002ee, 0x0) 12:32:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:36 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$getown(r0, 0x9) getdents(r1, &(0x7f0000000280)=""/135, 0x74f) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}, 0x0) pread64(r1, &(0x7f00000005c0)=""/178, 0xb2, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x40, 0x0) close(r2) r3 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x3fa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000000c0), &(0x7f0000000d40)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000383339816f2cdf7d84168591a20000000000000000000000000000000000fcffffff010000000f000000240000008977696662300000000000000000000000007465716c300000000000000000000000687773696d3000000000000000000000767863616e3100000000000000000000000000000000ffff00ffffffaaaaaaaaaaaaff0000ffff000000e0000000280100006001000073747000000000000000000000000000000000f6ffffffffffffff000000000048000000000000001800000006000000040055075aabd2c0ffffffff00ff000081000000ff070000000009000180c20000000000ffff00ff4e244e24f7ff0100fcff06007f00010000000080240024004552524f520000000000000000000000000000000000000000000000000000372e59bbd7f9de00200000000000000068b007beff0b7aae12f963c6b43a4aed0022c8a6fc45b0452f425df632f90000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aabbaaaaaabb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0100004a98a1add66b0c7eaf3d4f3e00110000000100000088bf69703667726574617030000000000000626f6e645f736c6176655f4b2e0c3f66787ac568305f746f5f627269646765006272696467655f736c6176655f300000ffffffffffffffff00ff0000000000000000ffff00ff00000000f000000058010000a8010000717500000000000000000000000000000018000000000000000000000000000000070000000000000009000000000000007374617469737469630000000000000000000000000000000000000000000000180000000000000001000000855e9c1381000000f7fffffffcffffffffffffff6d61726b000000000000000000000000000000000000000000000000000000001000000000000000f0ffffff00000000fdffffff0000000000000000000000000000000000000000000000000000000000000000000000000800000000000000feffffff000000004c45440000000000000000000000000000000000000000000000000000000000280000000000000073797a3100000000000000000000000000000000000000000000000004000000683f000000000000d3d2ebc6321777c4c29687172f4d84b2da861753b959dde37b050c7144c34bc9e12027857efc8014b94f8c3cf92ee74690d52cfb1909c04126220c12e49d9a72ad501e7ab989fd63e9e03b4057216728db"]}, 0x472) readv(0xffffffffffffffff, &(0x7f0000000040), 0x0) readv(r3, &(0x7f0000000180)=[{&(0x7f0000001200)=""/4096, 0xfffffe19}], 0x1) [ 1025.311997] syz-executor0 (28204) used greatest stack depth: 16936 bytes left 12:32:36 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$getown(r0, 0x9) getdents(r1, &(0x7f0000000280)=""/135, 0x74f) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000000140)}, 0x0) pread64(r1, &(0x7f00000005c0)=""/178, 0xb2, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x40, 0x0) close(r2) r3 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x3fa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f00000000c0), &(0x7f0000000d40)=ANY=[@ANYBLOB="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"]}, 0x472) readv(0xffffffffffffffff, &(0x7f0000000040), 0x0) readv(r3, &(0x7f0000000180)=[{&(0x7f0000001200)=""/4096, 0xfffffe19}], 0x1) 12:32:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) [ 1025.438693] audit: type=1800 audit(1547555556.958:1805): pid=28254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16993 res=0 12:32:37 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000340)='./file1\x00', r0, &(0x7f0000000200)='./file0\x00', 0x0) 12:32:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:37 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f0000000380)="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", 0x1000}], 0x1, 0x0) [ 1025.518409] audit: type=1804 audit(1547555557.028:1806): pid=28254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/265/file0" dev="sda1" ino=16993 res=1 12:32:37 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 12:32:37 executing program 4: io_setup(0xe24, &(0x7f0000000180)=0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) umount2(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r0, 0x1, &(0x7f0000000580)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1a4, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 12:32:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f0000e8f000)=@proc={0x10, 0x0, 0x1}, 0xc) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:32:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="1200000000000000007b46fa26000000100000000000000002"]}) 12:32:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="1200000000000000007b46fa2600000010b23067d629c3c96c"]}) 12:32:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 12:32:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000040)) 12:32:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='\b']}) 12:32:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x2) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/27, 0x1b}], 0x1) write$evdev(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setpriority(0x0, 0x0, 0x4) 12:32:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x2) readv(0xffffffffffffffff, 0x0, 0x0) write$evdev(r0, &(0x7f0000000240)=[{{}, 0x0, 0x1}], 0xfec4) socket$packet(0x11, 0x3, 0x300) 12:32:38 executing program 1: rt_sigaction(0x13, &(0x7f0000000380)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000480)) 12:32:38 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 1026.526894] audit: type=1800 audit(1547555558.048:1807): pid=28304 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17071 res=0 [ 1026.557432] audit: type=1804 audit(1547555558.058:1808): pid=28312 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/266/file0" dev="sda1" ino=17071 res=1 12:32:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) 12:32:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000000000000bfa30000000000000703000020feffff7a0af0fff8ffffffdb3af0ff00000000"], 0x0}, 0x48) 12:32:38 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) 12:32:38 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x100000d, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@empty, @initdev, @rand_addr="a2b1be98f54036ab4515143467e7592d"}) 12:32:38 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 12:32:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x2) readv(0xffffffffffffffff, 0x0, 0x0) write$evdev(r0, &(0x7f0000000240)=[{{}, 0x0, 0x1}], 0xfec4) socket$packet(0x11, 0x3, 0x300) 12:32:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_to_bridge\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="000000000c000000000000000800010073667100480f550614103f62975b864b0002000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 12:32:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_to_bridge\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000c000000000000000800010073667100480002000000000000000000000000000080000000000000000000000000000000ff68028b00afd82533b5ee39cae872000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 1027.494460] audit: type=1800 audit(1547555559.018:1809): pid=28344 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16641 res=0 12:32:39 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:32:39 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 12:32:39 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000440)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xfffffffffffffffb}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) [ 1027.598744] audit: type=1804 audit(1547555559.058:1810): pid=28344 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/267/file0" dev="sda1" ino=16641 res=1 12:32:39 executing program 1: [ 1027.746611] bridge0: port 2(bridge_slave_1) entered disabled state [ 1027.753293] bridge0: port 1(bridge_slave_0) entered disabled state [ 1027.992810] net_ratelimit: 16 callbacks suppressed [ 1027.992857] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.003533] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.009323] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.015864] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.022654] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.028444] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.163156] protocol 88fb is buggy, dev hsr_slave_0 [ 1028.168990] protocol 88fb is buggy, dev hsr_slave_1 [ 1028.210789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1028.217248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1028.223955] bridge0: port 1(bridge_slave_0) entered blocking state [ 1028.230331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1028.246638] device bridge0 entered promiscuous mode [ 1028.260300] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1028.292626] bridge0: port 2(bridge_slave_1) entered disabled state [ 1028.299164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1028.305818] device bridge0 left promiscuous mode 12:32:39 executing program 4: 12:32:39 executing program 2: 12:32:39 executing program 1: 12:32:39 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:32:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:40 executing program 1: 12:32:40 executing program 2: 12:32:40 executing program 5: 12:32:40 executing program 4: 12:32:40 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:32:40 executing program 1: [ 1028.646858] audit: type=1800 audit(1547555560.168:1811): pid=28375 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17089 res=0 12:32:40 executing program 4: 12:32:40 executing program 2: 12:32:40 executing program 5: 12:32:40 executing program 4: 12:32:40 executing program 1: 12:32:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:40 executing program 2: 12:32:40 executing program 5: 12:32:40 executing program 1: 12:32:40 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:32:40 executing program 4: 12:32:40 executing program 2: 12:32:40 executing program 5: 12:32:40 executing program 4: 12:32:40 executing program 1: [ 1029.322022] audit: type=1800 audit(1547555560.838:1812): pid=28406 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16625 res=0 12:32:40 executing program 2: 12:32:40 executing program 1: [ 1029.380423] audit: type=1804 audit(1547555560.878:1813): pid=28406 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/269/file0" dev="sda1" ino=16625 res=1 12:32:41 executing program 4: 12:32:41 executing program 5: 12:32:41 executing program 3: 12:32:41 executing program 2: 12:32:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:41 executing program 1: 12:32:41 executing program 1: 12:32:41 executing program 4: 12:32:41 executing program 3: 12:32:41 executing program 5: 12:32:41 executing program 2: [ 1029.915070] audit: type=1800 audit(1547555561.428:1814): pid=28427 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16695 res=0 12:32:41 executing program 1: 12:32:41 executing program 4: 12:32:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x2, 0x2) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) open(&(0x7f0000000180)='./file0\x00', 0x20000, 0x4) r1 = syz_open_procfs(0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000001c0)) getresuid(0x0, 0x0, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) setresuid(0x0, 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0xa94, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320]}, 0x2c) getegid() openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0x1}) [ 1030.081460] protocol 88fb is buggy, dev hsr_slave_0 [ 1030.086596] protocol 88fb is buggy, dev hsr_slave_1 12:32:41 executing program 2: syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) getresuid(0x0, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0xa94, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320]}, 0x2c) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) [ 1030.111591] audit: type=1804 audit(1547555561.468:1815): pid=28427 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/270/file0" dev="sda1" ino=16695 res=1 12:32:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[@ANYBLOB="0f33"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:32:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") msgsnd(0x0, &(0x7f00000002c0)=ANY=[@ANYRES32], 0x1, 0x0) msgrcv(0x0, 0x0, 0x3a1, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)) 12:32:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f00000002c0)=ANY=[@ANYRES32], 0x1, 0x0) msgrcv(0x0, 0x0, 0x3a1, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r1 = msgget(0x1, 0x401) msgctl$IPC_RMID(r1, 0x0) 12:32:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x2, 0x2) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = open(&(0x7f0000000180)='./file0\x00', 0x20000, 0x4) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) getresuid(&(0x7f0000000240), 0x0, &(0x7f00000002c0)) ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0xa94, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320]}, 0x2c) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x101800, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0x1, 0x2}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x6, 0x4}) 12:32:42 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x1) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf2502000000040005000800040000000000d126f3bebfa6eb124b5f120c0001"], 0x1}, 0x1, 0x0, 0x0, 0x84}, 0x40081) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\x00\x01\x00\x00\x01\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fallocate(r0, 0x0, 0x7, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.mems\x00', 0x2, 0x0) pwrite64(r3, &(0x7f0000000200)='0,', 0x2, 0x7) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r4, 0xb, 0x1}, 0x10) 12:32:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@ipv4={[], [], @empty}, @mcast2, @loopback, 0x0, 0xfffffffffffffffb}) 12:32:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 12:32:42 executing program 3: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x1) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="000229bd7000ffdbdf2502000000040005000800040000000000d126f3bebfa6eb124b5f120c0001"], 0x1}, 0x1, 0x0, 0x0, 0x84}, 0x40081) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\x00\x01\x00\x00\x01\x00'}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fallocate(r0, 0x0, 0x7, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.mems\x00', 0x2, 0x0) pwrite64(r3, &(0x7f0000000200)='0,', 0x2, 0x7) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r4, 0xb, 0x1}, 0x10) 12:32:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000040), &(0x7f00000025c0)=0xffffffffffffff93) 12:32:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") unshare(0x24020400) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @loopback, @remote}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @remote, @dev}, 0xc) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f00000001c0)=0x90) 12:32:42 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1030.975675] audit: type=1800 audit(1547555562.488:1816): pid=28473 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17169 res=0 12:32:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000740)="45dcc200176b94f71e3510b8f53cd42849e259ce591b0c950db205ded2a454de7fee9a8ea2f8c0bf99addd8aaa4e9dff5ac9e227874f1460cb00a58b7009cb9d5672d8233149bb44b19a1e4a8786d4a26a02d4f42cea02865cca09a0a5702d4f24351ce2e7103f5a66a42f82f88977c6e4c13cdc17bd386f284919fab93680bcbe13b4", 0x83, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000540)={'syz', 0x3}, 0x0, 0x0, r1) rmdir(&(0x7f0000000a00)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="5c01000000000000060000") mkdir(&(0x7f0000000500)='./file0\x00', 0x20) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e21, 0x401, @empty, 0x6}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r3, 0x80000) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) r8 = inotify_init1(0x0) mkdir(&(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) inotify_add_watch(r8, &(0x7f0000ac5000)='./bus\x00', 0xa400295c) r9 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000005c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYRES64=r2, @ANYPTR, @ANYRESHEX=r5, @ANYPTR64=&(0x7f0000000980)=ANY=[@ANYPTR, @ANYRES64=r8, @ANYRES32=0x0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYRES32=r6, @ANYRESOCT=r8]], @ANYRES64=r7], 0x1000001ed) ioctl$PIO_UNISCRNMAP(r3, 0x4b6a, &(0x7f00000006c0)="01000000505998ae713a502008a834a0009039597bd31b161202a452eca1e2f0e545ddde16bc04ea41d78ee4ad35ad540a93cc2f0a6095e68254ad9fa900c9d7f8c71f16e0d687e0ae79f94ff4d802629193c8ce0eb7f4c2c7848dea088c5c6eb752e5699f9a04de3b4671bfd9") ioctl$TIOCLINUX5(r4, 0x541c, &(0x7f0000000300)={0x5, 0x9, 0x100, 0x82, 0x5c3}) r10 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(r6, 0x29, 0xd3, 0x0, 0xfffffffffffffdf2) fcntl$setlease(r7, 0x400, 0x0) getsockopt$EBT_SO_GET_INFO(r9, 0x0, 0x80, &(0x7f0000000640)={'broute\x00'}, &(0x7f00000001c0)=0x78) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000480)={@mcast1, 0x400, 0x0, 0x3, 0xfdffffffffffffff, 0x1f}, 0x2b2) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6}) connect$inet6(r10, &(0x7f00000002c0)={0xa, 0x0, 0xfb, @mcast2}, 0x1c) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r11, r11, &(0x7f00000000c0)=0x202, 0xcd) 12:32:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@loopback, @dev, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@mcast2, @dev={0xfe, 0x80, [], 0x29}, @mcast1, 0x1, 0x24, 0xd2, 0x100, 0x8, 0xc00000, r2}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@dev, @mcast1, @loopback, 0x0, 0x7, 0x0, 0x0, 0x6a, 0x83420004, r2}) 12:32:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000140)) 12:32:43 executing program 3: syz_genetlink_get_family_id$nbd(0x0) ioctl$int_in(0xffffffffffffffff, 0x5473, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000000)=[{}]}) 12:32:43 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x7fffffff, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x20000000000, 0x0, @mcast1}}}, 0x104) 12:32:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:43 executing program 3: syz_genetlink_get_family_id$nbd(0x0) ioctl$int_in(0xffffffffffffffff, 0x5473, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, 0x0) getgroups(0xfe75, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x9}, {0x6}]}) [ 1031.983745] kauditd_printk_skb: 1 callbacks suppressed [ 1031.983758] audit: type=1800 audit(1547555563.498:1818): pid=28513 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17489 res=0 12:32:43 executing program 4: 12:32:43 executing program 2: 12:32:43 executing program 1: [ 1032.176358] audit: type=1804 audit(1547555563.568:1819): pid=28513 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/272/file0" dev="sda1" ino=17489 res=1 12:32:43 executing program 1: 12:32:46 executing program 5: 12:32:46 executing program 2: 12:32:46 executing program 4: 12:32:46 executing program 1: 12:32:46 executing program 3: 12:32:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:46 executing program 4: 12:32:46 executing program 3: 12:32:46 executing program 2: 12:32:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000300)='reiserfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:32:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x8}}, 0x50) 12:32:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, 0x0) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r6 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0x138, 0x0, 0x0, 0x10000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xba, 0xfffffffffffffffe, 0x0, 0xdac6, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x80000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x9c2, 0x0, @perf_bp={0x0}, 0x20048, 0x0, 0x0, 0x0, 0x73}, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}, {&(0x7f00000008c0)=""/107, 0x6b}], 0x2, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {&(0x7f0000000e80)=""/243, 0xf3}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0}, 0x100000001}, {{&(0x7f0000002e40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000002fc0)}}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f0000003080)=""/70, 0x46}], 0x1, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x6, 0x20, &(0x7f0000006740)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(r1, &(0x7f000000e9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ea00)=0x14, 0x800) 12:32:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') r3 = getgid() lchown(&(0x7f0000000080)='./file0\x00', 0x0, r3) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r5 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}], 0x1, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {0x0}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000001600)=""/37, 0x25}, 0x100000001}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f0000003080)=""/70, 0x46}], 0x1, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x5, 0x20, &(0x7f0000006740)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) 12:32:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') keyctl$invalidate(0x15, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) getgroups(0x4, &(0x7f0000000380)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01]) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(r2) getdents64(r2, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000040)={'ip6gretap0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000067c0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000068c0)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getpeername$packet(r2, &(0x7f0000006d00), &(0x7f0000006d40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) accept4(r5, 0x0, &(0x7f0000008640), 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(r1, &(0x7f000000e9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ea00)=0x14, 0x800) [ 1035.562254] audit: type=1800 audit(1547555567.078:1820): pid=28545 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17649 res=0 12:32:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') r3 = getgid() lchown(&(0x7f0000000080)='./file0\x00', 0x0, r3) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r5 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}], 0x1, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {0x0}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000001600)=""/37, 0x25}, 0x100000001}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f0000003080)=""/70, 0x46}], 0x1, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x5, 0x20, &(0x7f0000006740)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) 12:32:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, 0x0) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r6 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x138, 0x0, 0x0, 0x10000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xba, 0xfffffffffffffffe, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x80000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x9c2, 0x0, @perf_bp={0x0}, 0x20048, 0x0, 0x0, 0x0, 0x73}, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}, {&(0x7f00000008c0)=""/107, 0x6b}], 0x2, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {&(0x7f0000000e80)=""/243, 0xf3}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000001600)=""/37, 0x25}, 0x100000001}, {{&(0x7f0000002e40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, 0x0}}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x6, 0x20, &(0x7f0000006740)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f000000ea00), 0x800) 12:32:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, 0x0) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r6 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x7ff, 0x138, 0x0, 0x0, 0x10000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xba, 0xfffffffffffffffe, 0x0, 0xdac6, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x80000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x9c2, 0x0, @perf_bp={0x0}, 0x20048, 0x0, 0x0, 0x0, 0x73}, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}, {&(0x7f00000008c0)=""/107, 0x6b}], 0x2, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {&(0x7f0000000e80)=""/243, 0xf3}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0}, 0x100000001}, {{&(0x7f0000002e40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000002fc0)}}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f0000003080)=""/70, 0x46}], 0x1, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x6, 0x20, &(0x7f0000006740)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(r1, &(0x7f000000e9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ea00)=0x14, 0x800) [ 1035.752192] net_ratelimit: 20 callbacks suppressed [ 1035.752199] protocol 88fb is buggy, dev hsr_slave_0 [ 1035.762402] protocol 88fb is buggy, dev hsr_slave_1 [ 1035.768758] protocol 88fb is buggy, dev hsr_slave_0 [ 1035.774796] protocol 88fb is buggy, dev hsr_slave_1 12:32:47 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') keyctl$invalidate(0x15, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) getgroups(0x4, &(0x7f0000000380)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01]) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(r2) getdents64(r2, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000040)={'ip6gretap0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000067c0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000068c0)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getpeername$packet(r2, &(0x7f0000006d00), &(0x7f0000006d40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) accept4(r5, 0x0, &(0x7f0000008640), 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(r1, &(0x7f000000e9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ea00)=0x14, 0x800) 12:32:47 executing program 1: io_setup(0x9, &(0x7f0000000200)=0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141442, 0x0) io_submit(r0, 0x1, &(0x7f0000000700)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 12:32:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') r3 = getgid() lchown(&(0x7f0000000080)='./file0\x00', 0x0, r3) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r5 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}], 0x1, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {0x0}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000001600)=""/37, 0x25}, 0x100000001}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f0000003080)=""/70, 0x46}], 0x1, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x5, 0x20, &(0x7f0000006740)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) 12:32:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, 0x0) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r6 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x138, 0x0, 0x0, 0x10000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xba, 0xfffffffffffffffe, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x80000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x9c2, 0x0, @perf_bp={0x0}, 0x20048, 0x0, 0x0, 0x0, 0x73}, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}, {&(0x7f00000008c0)=""/107, 0x6b}], 0x2, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {&(0x7f0000000e80)=""/243, 0xf3}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000001600)=""/37, 0x25}, 0x100000001}, {{&(0x7f0000002e40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, 0x0}}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x6, 0x20, &(0x7f0000006740)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f000000ea00), 0x800) 12:32:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, 0x0) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r6 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x138, 0x0, 0x0, 0x10000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xba, 0xfffffffffffffffe, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x80000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x9c2, 0x0, @perf_bp={0x0}, 0x20048, 0x0, 0x0, 0x0, 0x73}, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}, {&(0x7f00000008c0)=""/107, 0x6b}], 0x2, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {&(0x7f0000000e80)=""/243, 0xf3}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000001600)=""/37, 0x25}, 0x100000001}, {{&(0x7f0000002e40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, 0x0}}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x6, 0x20, &(0x7f0000006740)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f000000ea00), 0x800) 12:32:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') r3 = getgid() lchown(&(0x7f0000000080)='./file0\x00', 0x0, r3) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r5 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}], 0x1, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {0x0}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000001600)=""/37, 0x25}, 0x100000001}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180)=[{&(0x7f0000003080)=""/70, 0x46}], 0x1, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x5, 0x20, &(0x7f0000006740)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r4, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) 12:32:47 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, 0x0) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000440)=0x2, 0x4) r6 = openat(r2, &(0x7f0000000480)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x138, 0x0, 0x0, 0x10000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0xba, 0xfffffffffffffffe, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x80000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x9c2, 0x0, @perf_bp={0x0}, 0x20048, 0x0, 0x0, 0x0, 0x73}, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000640)) recvmmsg(r2, &(0x7f0000006540)=[{{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)=""/65, 0x41}, {&(0x7f00000008c0)=""/107, 0x6b}], 0x2, &(0x7f0000000980)=""/145, 0x91}, 0x1}, {{&(0x7f0000000a40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000ac0)}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/164, 0xa4}], 0x3, &(0x7f0000000c40)=""/166, 0xa6}, 0x9}, {{&(0x7f0000000d00)=@rc, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d80)=""/248, 0xf8}, {&(0x7f0000000e80)=""/243, 0xf3}, {&(0x7f0000000f80)=""/177, 0xb1}], 0x3}, 0x4}, {{&(0x7f0000001080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000001600)=""/37, 0x25}, 0x100000001}, {{&(0x7f0000002e40)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, 0x0}}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)=""/237, 0xed}, 0x2}], 0x6, 0x20, &(0x7f0000006740)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f000000ea00), 0x800) 12:32:47 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') keyctl$invalidate(0x15, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) getgroups(0x4, &(0x7f0000000380)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01]) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(r2) getdents64(r2, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000040)={'ip6gretap0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000067c0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000068c0)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getpeername$packet(r2, &(0x7f0000006d00), &(0x7f0000006d40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) accept4(r5, 0x0, &(0x7f0000008640), 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(r1, &(0x7f000000e9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ea00)=0x14, 0x800) 12:32:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') keyctl$invalidate(0x15, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) getgroups(0x4, &(0x7f0000000380)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01]) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(r2) getdents64(r2, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000040)={'ip6gretap0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000067c0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000068c0)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getpeername$packet(r2, &(0x7f0000006d00), &(0x7f0000006d40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) accept4(r5, 0x0, &(0x7f0000008640), 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(r1, &(0x7f000000e9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ea00)=0x14, 0x800) 12:32:48 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') keyctl$invalidate(0x15, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) getgroups(0x4, &(0x7f0000000380)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01]) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(r2) getdents64(r2, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000040)={'ip6gretap0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000067c0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000068c0)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getpeername$packet(r2, &(0x7f0000006d00), &(0x7f0000006d40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) accept4(r5, 0x0, &(0x7f0000008640), 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(r1, &(0x7f000000e9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ea00)=0x14, 0x800) 12:32:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x1, {{0x2, 0x0, @multicast2}}}, 0x84) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000300)={0x100000001, {{0x2, 0x0, @multicast1}}}, 0xffffff75) [ 1036.465636] audit: type=1800 audit(1547555567.988:1821): pid=28605 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17505 res=0 [ 1036.488426] protocol 88fb is buggy, dev hsr_slave_0 [ 1036.488494] protocol 88fb is buggy, dev hsr_slave_1 12:32:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') keyctl$invalidate(0x15, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) getgroups(0x4, &(0x7f0000000380)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01]) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(r2) getdents64(r2, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000040)={'ip6gretap0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000067c0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000068c0)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getpeername$packet(r2, &(0x7f0000006d00), &(0x7f0000006d40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) accept4(r5, 0x0, &(0x7f0000008640), 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(r1, &(0x7f000000e9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ea00)=0x14, 0x800) 12:32:48 executing program 1: fstat(0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f000062b000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/252) rt_sigpending(0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x1, 0x2000000000002) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, 0x0) 12:32:48 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r0, &(0x7f00000011c0)={{0x2, @netrom}, [@rose, @remote, @remote, @bcast, @null, @null, @bcast, @null]}, 0x10) 12:32:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:48 executing program 5: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r0, &(0x7f00000011c0)={{0x3, @netrom}, [@rose, @remote, @remote, @bcast, @null, @null, @bcast, @null]}, 0x10) 12:32:48 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000280)=0x7, 0x4) listen(r0, 0x50) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) recvmmsg(r1, &(0x7f0000004300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 12:32:48 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') keyctl$invalidate(0x15, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001100)={{{@in6, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) getgroups(0x4, &(0x7f0000000380)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01]) r4 = getgid() lchown(&(0x7f0000000080)='./file0\x00', r3, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x400000, 0x0) fchdir(r2) getdents64(r2, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000280)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000040)={'ip6gretap0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000540)={0x0, @loopback, @broadcast}, 0x0) getsockname$packet(r2, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @remote}, @in=@local}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000067c0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000068c0)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000006940)) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000006980)={'team0\x00'}) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000006a00)={@initdev, @multicast2}, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getpeername$packet(r2, &(0x7f0000006d00), &(0x7f0000006d40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000007000)={{{@in=@loopback, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000007100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000008580)={'vcan0\x00'}) accept4(r5, 0x0, &(0x7f0000008640), 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f000000e900)={'vcan0\x00'}) accept4$packet(r1, &(0x7f000000e9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000ea00)=0x14, 0x800) 12:32:48 executing program 1: 12:32:48 executing program 2: 12:32:48 executing program 2: 12:32:48 executing program 3: 12:32:48 executing program 1: [ 1037.217105] ax25_connect(): syz-executor5 uses autobind, please contact jreuter@yaina.de 12:32:48 executing program 4: [ 1037.303196] ax25_connect(): syz-executor5 uses autobind, please contact jreuter@yaina.de 12:32:48 executing program 1: 12:32:48 executing program 2: [ 1037.354563] audit: type=1800 audit(1547555568.858:1822): pid=28653 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17117 res=0 12:32:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:49 executing program 1: 12:32:49 executing program 4: 12:32:49 executing program 5: 12:32:49 executing program 2: 12:32:49 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x10000000003) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000240)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) 12:32:49 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @local, 0x0, 0x4, [@local, @local, @multicast1, @remote]}, 0x20) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) [ 1038.131717] audit: type=1800 audit(1547555569.648:1823): pid=28677 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16547 res=0 [ 1038.167528] audit: type=1804 audit(1547555569.678:1824): pid=28677 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir717343603/syzkaller.h0uV4P/276/file0" dev="sda1" ino=16547 res=1 [ 1038.393043] protocol 88fb is buggy, dev hsr_slave_0 [ 1038.398789] protocol 88fb is buggy, dev hsr_slave_1 [ 1038.405726] protocol 88fb is buggy, dev hsr_slave_0 [ 1038.411648] protocol 88fb is buggy, dev hsr_slave_1 12:32:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @rand_addr="afb0cb46f94bb8cba977be12e2ab63fe"}, 0x1c) 12:32:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bc070") pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a52e) socket$inet(0x2, 0x3, 0x7f) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 12:32:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x200000000000007}, 0x1c) sendmmsg(r1, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000500), 0x4ad}], 0x1}}], 0x253, 0x0) 12:32:50 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00001400000086dd6085896900082c008cc851dfb4b7df0223bd8aa4f091408100000000000000000000ffffac14dbaa00000000000890788497651967d9f17806791e1242b59f293f58621c7420e8c0c3c8642871ee9e723f0f81627910ef506f0f11436bff1021a1068ff5b961af8ace419426277b7a19df8596e548e73f30c03c7bb02fd5af8a3cebf4d0de0a5614bc26bba421a9cf4e9c22a3f552d0070994bd0c59eccd74725e6c2836571b76ed7ca28bb9b987970197be68c1000000005e5ed787b3a7160664f13ce5c5f2d2426e9100bcb9bb33ed8dde79"], 0x0) 12:32:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x19) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) 12:32:50 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(0x0, 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:50 executing program 1: r0 = accept(0xffffffffffffff9c, &(0x7f0000001700)=@un=@abs, &(0x7f0000001780)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001800)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f0000001900)=0xe8) sendmsg$nl_generic(r0, &(0x7f0000003bc0)={&(0x7f00000017c0)={0x10, 0x0, 0x0, 0x8840809}, 0xc, &(0x7f0000003b80)={&(0x7f0000001940)={0x1034, 0x1e, 0x200, 0x70bd27, 0x25dfdbfe, {0x4}, [@nested={0x1020, 0x90, [@generic="a09e83702df3589b82ade84a50e1a71be23f1f417617e8d6a09640617ba322ca56b0bbacf1c7b7ee06b0c3f60bce4976139c9a5cf59afc529f2307b740ae1c60e84458b1b3297c0a683c8e3d11f5bafa68a09423070a258d072b131bf5af9b19c9c9742ad51bfa0c384a803367e7bba6dd9f066bd69d6bf55bfe5765b14d4d9df274223c2fc4305a07a7388a00c54f85ef41c37448430bf491515ebcfa369e6284e11e32185de3270880eb598f9c3969be0fae080e9b3b83cf138442419abf9a1d6400db534c05d03a0dd6f27c0887e96e9779e146fb32bf006bc8bb5e713351bc6a50a1c6cb37d0346184985d48a60e5fcd958c1d3ae68a09598f25302987af60049bf359edd76f807a3dc206ac579860202a822207d2d5239314d4f4675c25b33acf8313524c1f32cb34bea04b015f60c2e8d0b2cff3356093604456e90bddb37fa95a9f419e8505d14383cdeda3fd8272b6cbf26c678f82fd26a1aded8cb3eec06232b859b5665297668000f0105ba670aac07be6ef951d455c6a6275fefed1afd51d1631bac6a989660c933fc9e8ce11b6edbee19c1c3fd908af4ee025a04e9f6e2eab3605cfbcc21027b1e31f567a5bebc744103859df8d1ebf98763a9a5e3794426aada2087701f0d2c1718ac9a047119635117b1e37895085740b702c41cc826c5957104557687e3929688adbd81a578ea54852aac9b38cf4d145a9a03151c60bfbd3d12ba0dc96ca0d5787574e92f239dace9e8ab6f560f119411b73832253fb370e0de3bd1243400b6abc919ef2576f860382d27fc279db2d9f05b240c8eedcf8e56c402f5fbcc212390fddcf660870a800847f876274715ec288449c06e3e3bf4b07e93d6b47768355086ff20d01d849a02f56fd92f9e22422ba660b611d9c8732d4f545e13c6839abeb129a6c0ccab813835aeab140a6bab09fb12c26c36a163beb0459cd171aa408da8e40e2c27538d1c40cfad0dd06d74cfde91fef85c1e33e1d70a360c086a7531c173964a36be0d6a2fe07cf66a11f0e0e7d3dc384415b656c83c66f13504bc4905f6e0541caaf654ba197b625796fc8cb0ebcf74c70ec896f5b2ab50d1b910bae68b0e059d4a73757a13e251ed865cdf1a5bc4e6e4685e09fd9978de7dcf9a12b890bfd0399f669ce0d4e86cda1b23fbb78fcef941e3abed4b634035ad623d4ad6580d5540b17df6f769abf84edeb9ae96fe26a5a615e7f6f04f9c5247a1db55be864c78806eb92212a7c513f3cdddf7abcaac191152b96bf62213151992d25811b29f431cf6b7b683589a525925145899e9244c7ab0c5698892b2e340e945ead2224e2f2b6d67ecb6e027f6ec50731bcc84ea3157bceee3716a46150ddf6e7a7a35acab001a7d3d33bb600cb22fba652eec70f82b99c9b9d4c876edbfae1e9f6dd8ff4b04222f782ab5dcf1e62307064deffdc33ec00b5340863a7ddd65d8f1e456aa7be908125e24fe84974a692cba60d9f4522c482493fcfa22ff7e049f09692edcee4a35700fed662e8125ce869ce6c558d6a5cf106ae2676cdbff6093d1a9492547e3a668c689d6ac0f82c1ccd75dfb646e150dfe80a0f523089924473f23702d4a4342ffd0a26fa59b63ebc3829de0ab8c2bf15f875de3dc0924ba7997119af02311718ad693f249a0c7e3833d8c1e417d02ab4d7bc9894466838cc612358059ab470ac90d520ec9f9f93d01ca24a2808c6b202dd6708d949f5f11a10a1aed6507c5f1bfe4434a89d437400b14eb305776637347bc8181cf26804cee7b8ec5ad3da3acc20f587fdc81496aa819b2303535ec77e0efcdb7874e9c36b0afea5c1c2526cbec4c22fd841aeb4235b783e35f068a2cf9e9586afa9cf1bfaaee3df7143b0039b2547469e08d116ee586ed355710f3f09c484c54676395d2178c93d7297571ac13da746dc9b462fbfd54bd78bdfc46ac3d6e8935377dc8938cb3625bf101b8887378a49347109ee5f3518ae85701b2915ced6a2b3e236b0dfe7c134dc0e51b829e305c3640a61458a63126e0844206bd5ed649d427f713052e69858973823e70a234d5657193353d2b5d105c360fc13f01b95cee5101abc492b050711b10eb2442308e45a1986d3d194cd4c706765a7f6db606666fa37719a81cd77a73746d1b39cb152be4185ba4a58854b30227fe79064aa20b532d6a9f457a3c006f60a3545497dfe5ae739f1f527d34d49d73d205af6db6690281fa49ccbfed208e5f11075a2d94b867acccbc24c9daaeff4fc4d9e3871cfb47a02b200e535fdc706b432378c6fe19465d969ce8657c91aa58358cff6450beeba72a4bfdd1bb67e4a70468fa626d0ddc71e6e54ded8d66ae1d59ed1c6072c782c5153def5c8057c6a14722a13a5398ac63f1e1aae5417c2466b43bfd8097c9024016b82a5f8a5c2867e87f83e8bce5e3aac8dfec7c54f9f788803d01533a087e0ab77c7c5ecd3da67952b11fa428f289c4fd6f4720a10bfd37123aab90246a4ec642d6d43ae7d4ea17e7d555f1b8401727870a57243b18f7862fba86f344598277a511b6db08be5e5922b77668596c055c5a7c697a2ccc8cda80c13ad51574750d9540196d6a99dc536591e9f2b8404d49d1f56ea7e044a6f1d258c3ebbf63eee7f9ab27b39f87eca2ec96d93c06f97c910ac339b08395126ce32403367e8557d284474cd2b198b6c12421d91251d4c9c6e95ff371c50a6e7ed3fe4252cd67aace3181d37be4a191be570c3190da534494340ab4cc91d778caa1d37afd9ebb0c3246096e4ebc7ae1a612d80661ee518d754c041ce7c848587f1425ee0d2de463ac4e45834ed8460bb000f3a5a5e681190cf0aade0737144f591aafae79cf6725e4c2fbeb6a7e71f118c9a07b07d67500631ef9180b1b6c26f0d546bb9fd5d0472a2ca563ecbdaeab2606c1ff6c68c5ecc7b4d06ec7373ece1f982470d356aa7da110fd3cc9fb37ed77fec2f1b92ab70ce23aae9cfe34610026d2c357e05917e3c4538a02362263c9140d1c23d907a38c3a8caf238c6691afdb1bf2d17b476a26e730504d75b0e2f5b5b147bbe31c2d08f6e1e6c471a74f0c98c6d38f8f8b5466b410b61fe0a243697f862e2be71b3504677a564bae2ae3e156883a935e8c21f37fc4325e14a90242bbee1a9a6906e50892df2e6eead056d32723023c6720c9f8a7c139e5c84fbcef6cd81e984b1afa564a819c2310a58663559d2d64287d79463e3ae0075e6efdc5868bcbe9f2126bcb17c67dd13ce6a2e8a554b73102c0d8c5272b4948925733d40f60693f6885b98b100a1921c8d6b5372b6318152964d6c0a434212f2bf4eda810d0a7c899d5d06f6b10681dedc5e87effa29a531623798d5fc91ee974d31e78f80c28c50030703f6acebabe4d5f19e9e8ce941f68329a1b215c337a3c3ab4fac292926b3ae74cb6815399ca6a424dbd7676ec1cd157913a9e470b542f1b83a2622ab0c637cfc8ae48a97f5df02549453bd84a19eb4afa2d0e129209db260786cded51769a47f8b30e430de2e1a9bb7f35dff14118fe6ec79cea1c0120739717f7590c248e4bea90e207b4bbaac2ae3bb35b2a6155a2b5b897cc651817b23734ba51cebe3e8bc21d7a38ffbc9935d7c86769f6b978bd1eae011134bc8da7d848fb8d6b292f645e5e012b382110daafa2f8355e665d4ce955c9559d57fa1ed265382f18be0baa7de3c14f122856404446c2b08f219800fbb532570bd29c5fc70138a02da2299b23ecac58d119f4e0fa0f5e4eb7c89ad0879a6c1032976bebfa4ff0aabdf0782e1f51cff1bb0ab16b08d492f71365b1d554fdc77e9053b5a22fb5bc4978a547985473754cd40988801bba752572a12f4fa38cf1c2bbb57053fe5d4247fc13118ec734a9ad361e607cc5e2a2c0cedccdf47eefe35e9083a3c4af71207d9bd46d45f765a973ae9da86f702feecad89bbfe2a2aea1a817a55dfe3c2db1e187018c9ab71d32fe180332fb939dccf4f51d3a507f31e1bc970465ab8883a682046fb05db5b17d3f801f8cd47b0f7c0db9c249e96cf61f4b00f060cdca0c8b06cd998147a323e75588adfd807237f25583313b74f0ac1ea15660875415cad28e9a713403cc038ba02838b93f386c55efe1207302505b07e591736138c5097fb77e204e446b97947541fb6e211325a308cfe7555efec395e110e70faf1319b53acfbd3b8244c00e3f9c7e29ae111f68469c8ec8b115b44c842648dc970913c69dfa72d19f8f1e5bbc80f9149a4dd72bd6576445bba9f880ed27725925779885352bf9c40aaaf0338d18fac5e18225e80c9a6d2bfe8085acb4c7dda93c01d24a9f91105b8880fb5810f617daa73367f5fbfb625c86b7b52fd4f7e3394a72618b2e7b8f6533138d74efaf78be111abe63a7c32d5e1f15429b9930a08323ec72587822480e348a5f0dd406bbc31ef98d67a578234c37003af04c7d905034c53c89c113c1bcfd926ae50e6def965f1c7d34d938133e52a1dd24b05ca5e0917833e9c1090094c16061764006b25e10ebbd3ece2dcb6d27aa24fd31dd4c0a40865b54cbc6cb81c332c012a819773743e5d5da345c57be374787171a0228cde0bf49cf85e8c629fcadc20d1d9e2b39c6a657528e5685536929fb3e8e43fce50eda4e71d9c6df82650d69ea4bf7e8dd520a0a9fa8aaeddf18f8727ec3d0deace5973e6f50a1d2058071f5c270be406dc4e67707bd30b0600f1582be13d6767bc8f475bfe21f1cf123bb616265f368600f3d253249fb3983d41306dc0563434d5d923b2bff7c20635574cec64a36e9000343cb4d3103d23ab0d32bf7158964aa0f3cab6efea6f4cdf3544329184fa09bf3c282317ede5e123c2f74278c12c38b1ee2c2ff3938e870e4042f1ca4dfe98a6b90f431a38352f9f1b77fbc87407770182d66c40c67af13005b818a75dfcacc8c7888b0d7fcf240727f41716908a0cb4d1ec85464b5906b8a4ad3274f42bb68065d1539a0b65bd87a47b5a7ae910f53fec0261ec0ae94c9bef0ce707089b21e08348d4741b11c2e8138935b0b32f787f07bbf355f55e67023d906a20b420a8cbe050f850bef7a932b44be79f8c99ae766d8bd14f230124fef2d613f3f1ceb00b990105c174664c89b1c4c4e99d84c9dd797c26a6e43bf442ec45683f5002934df837a47b66ca82ef3db21838e27e02511e59e6ade416f5abbac3b4cfd2d540bed6722a76a51038b75b88418210b88fb0e554da0bd0e338135b9a453c6f4d0e4a5cd466ac25697078636afc85d45630d76ddf96c53eb91877450b553b34313866995950c3c3fa3e6234b5bce0816300f81c90249c4a9b9efd2ed645fdf48af0fe7ca43919c87e3e31d577f9383f5335ce03a46d642a14b2d38dbcdf5be50ef204fac0ee43c9c0bcc73e3ee004dbc83f2946389590e0d42ef51414b3b74726a4b7dd645f391b7042db7aaf010a4340ffb3c07c4857dd2096730ed51dc1813f3619dce3b3b7b87837b79ea5bef832bf1f9eb0811fa12e6d8d9c5f4f6983672b5aea7d2376b054c22d84ca1432a64d3bd1edc1de2daf988623890e9ad9241de85a51b98ed5b9b8ea17e604e6a4f1363991cf0632704b687422736d72aea1b996b88283397979be68217a43c95b9c71a422e76e0f945e6f2c9ec8c550ce9ff46556651421b2a703626426a9047dadd17fd12b3150483b330fda73a7664641da8a223c203fa811812cbe61f5704e072a2d3cde2aab98cda84f8d7e73c6414636d7f9efdd46bea69959b3cd4b898453625c1074da6601b5bdbbf1c27f57e63d01879107b2", @typed={0xc, 0x84, @u64=0x101}, @typed={0x8, 0x10, @ipv4=@local}, @typed={0x8, 0x40, @uid=r2}]}]}, 0x1034}}, 0x40040) r3 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev}, 0xffffffffffffff43) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000080)={{0x2, 0x4e23, @empty}, {0x306, @dev={[], 0xb}}, 0x18, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'veth0_to_hsr\x00'}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bpq0\x00', r1}) 12:32:50 executing program 2: socketpair(0x11, 0xa, 0x6, 0x0) [ 1040.476831] IPVS: ftp: loaded support on port[0] = 21 12:32:52 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000000)={@broadcast, @link_local, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @dev, @rand_addr="586ec603276d07757e472eab247dc6f7", @link_local, @empty}}}}, 0x0) 12:32:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001280)={0x5, 0x4, 0x800, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x0}, 0x18) 12:32:52 executing program 2: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000040)='%d') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0ffd8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x0, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", 0x0, 0x69}, 0x28) 12:32:52 executing program 5: [ 1041.130701] chnl_net:caif_netlink_parms(): no params data found [ 1041.317669] bridge0: port 1(bridge_slave_0) entered blocking state [ 1041.324315] bridge0: port 1(bridge_slave_0) entered disabled state [ 1041.331455] device bridge_slave_0 entered promiscuous mode [ 1041.338648] bridge0: port 2(bridge_slave_1) entered blocking state [ 1041.345211] bridge0: port 2(bridge_slave_1) entered disabled state [ 1041.352797] device bridge_slave_1 entered promiscuous mode [ 1041.542886] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1041.552383] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1041.719831] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1041.729114] team0: Port device team_slave_0 added [ 1041.734874] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1041.742389] team0: Port device team_slave_1 added [ 1041.747687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1041.755376] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1041.964437] device hsr_slave_0 entered promiscuous mode [ 1042.001907] device hsr_slave_1 entered promiscuous mode [ 1042.180330] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1042.187640] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1042.336749] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1042.370043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1042.378476] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1042.386284] device bridge_slave_1 left promiscuous mode [ 1042.392487] bridge0: port 2(bridge_slave_1) entered disabled state [ 1042.422131] device bridge_slave_0 left promiscuous mode [ 1042.427580] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.024486] device hsr_slave_1 left promiscuous mode [ 1046.068130] device hsr_slave_0 left promiscuous mode [ 1046.115135] team0 (unregistering): Port device team_slave_1 removed [ 1046.128463] team0 (unregistering): Port device team_slave_0 removed [ 1046.139290] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1046.180338] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1046.277066] bond0 (unregistering): Released all slaves [ 1046.377717] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1046.384574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1046.395919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1046.407294] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1046.413872] 8021q: adding VLAN 0 to HW filter on device team0 [ 1046.423217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1046.430337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1046.438792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1046.446793] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.453175] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.460376] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1046.474871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1046.483620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1046.491818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1046.499383] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.505774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.522274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1046.532608] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1046.539627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1046.548144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1046.561166] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1046.571939] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1046.579027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1046.587297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1046.595102] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1046.603165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1046.611000] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1046.663316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1046.672667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1046.679428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1046.687392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1046.694879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1046.702830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1046.713712] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1046.728354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1046.761064] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1046.784786] 8021q: adding VLAN 0 to HW filter on device batadv0 12:32:58 executing program 3: 12:32:58 executing program 4: 12:32:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(0x0, 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:32:58 executing program 5: 12:32:58 executing program 2: 12:32:58 executing program 1: 12:32:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) socket$inet_tcp(0x2, 0x1, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 12:32:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'dummy0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000300016002c0001002800010000000000000006000000000000000000000100000000000000"], 0x1}}, 0x0) 12:32:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) syz_genetlink_get_family_id$ipvs(0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x101000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000002c0)) 12:32:59 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x7) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={@dev, 0x0, r1}) 12:32:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0\x00'}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0000000100972bd2e3000000"], 0x1}}, 0x0) 12:32:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x2, 0x4, 0x2, 0x0, r0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r1, &(0x7f00000002c0)}, 0x10) [ 1047.641719] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 12:32:59 executing program 5: 12:32:59 executing program 1: [ 1048.232432] net_ratelimit: 7 callbacks suppressed [ 1048.232457] protocol 88fb is buggy, dev hsr_slave_0 [ 1048.243040] protocol 88fb is buggy, dev hsr_slave_1 12:33:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(0x0, 0x40c2, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:33:00 executing program 4: 12:33:00 executing program 3: 12:33:00 executing program 5: 12:33:00 executing program 2: 12:33:00 executing program 1: 12:33:00 executing program 3: 12:33:00 executing program 4: [ 1048.955234] protocol 88fb is buggy, dev hsr_slave_0 [ 1048.960913] protocol 88fb is buggy, dev hsr_slave_1 [ 1049.191492] protocol 88fb is buggy, dev hsr_slave_0 [ 1049.196723] protocol 88fb is buggy, dev hsr_slave_1 12:33:00 executing program 1: 12:33:00 executing program 3: 12:33:00 executing program 2: 12:33:00 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000140)={0x90000001}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) socket$caif_stream(0x25, 0x1, 0x0) write$binfmt_misc(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="73795f312da0a1950454374ef134461d617b5b80528654f0ea473ac9a8e19e1f8c8ea802006c0e723209051b71b42d3abcb18d7ea1c264a99c537bf1dfe42d9d2f6b3b9aa50dff7644e5528d0ed0a4828b4f0e7efb47e53f19094d5826c1d0f1e9bff382fcd108258a3ed68aa182b338be0000000000000000"], 0x79) [ 1050.369399] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.374544] protocol 88fb is buggy, dev hsr_slave_1 12:33:02 executing program 1: 12:33:02 executing program 4: 12:33:02 executing program 2: 12:33:02 executing program 3: 12:33:02 executing program 5: 12:33:02 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:33:02 executing program 3: setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000380)={{0x0, @loopback, 0x0, 0x0, 'wlc\x00'}, {@empty, 0x4e23, 0x10000, 0x0, 0xe6d, 0x4}}, 0x44) getpid() syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) semop(0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) recvfrom$llc(r0, &(0x7f0000000400)=""/213, 0xd5, 0x2000, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x293de264, 0x0, 0x0, @random="3a1146fd0334"}, 0x10) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) 12:33:02 executing program 5: accept(0xffffffffffffffff, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x80000000002, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000001600)={0x400000000002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000bc0)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6102]}, 0x45c) 12:33:02 executing program 1: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00c462913878fe3e0f1110c442019dccd3196f") clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msgrcv(0x0, 0x0, 0x50a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000140), 0x4) msgsnd(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="03"], 0x1, 0x0) 12:33:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) 12:33:02 executing program 4: syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x201, 0x0) [ 1050.881531] protocol 88fb is buggy, dev hsr_slave_0 [ 1050.886680] protocol 88fb is buggy, dev hsr_slave_1 12:33:02 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x1}, 0x20) 12:33:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0x800000800000001) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'veth1_to_bond\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'veth1_to_bond\x00', 0x1}) 12:33:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000200)=0x7fffffffff, 0x4) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x13f698e4b9e299b7, 0x1, 0x0, 0xffffffffffffff06) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f00000001c0)=0x5ae67028, 0x3af) 12:33:02 executing program 3: setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000380)={{0x0, @loopback, 0x0, 0x0, 'wlc\x00'}, {@empty, 0x4e23, 0x10000, 0x0, 0xe6d, 0x4}}, 0x44) getpid() syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) semop(0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) recvfrom$llc(r0, &(0x7f0000000400)=""/213, 0xd5, 0x2000, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x293de264, 0x0, 0x0, @random="3a1146fd0334"}, 0x10) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) 12:33:02 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60c22df7000b2c00fe800000000000000000000000000000fe8000000000000000000000000000aa00c623050f57bac26d53000000040190"], 0x0) 12:33:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x358, 0x138, 0x138, 0x138, 0x138, 0x0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x3, &(0x7f0000000100), {[{{@ipv6={@loopback, @dev, [0xffffffff, 0x0, 0x0, 0xffffff00], [0xff, 0xffffffff, 0xff000000], 'bond_slave_0\x00', 'veth0_to_bond\x00', {0xff}, {0xff}, 0x0, 0xff, 0x4, 0x40}, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'teql0\x00', 0xc6}}}, {{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffff00, 0xffffff00, 0xff000000], 'veth1_to_team\x00', 'yam0\x00', {0xff}, {0xff}, 0x88, 0x1f, 0x0, 0x1}, 0x0, 0x110, 0x178, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x0, 0x2, 0x1, [0x8, 0x400, 0xc8dd, 0x0, 0x0, 0x7fffffff, 0x4, 0x1, 0x0, 0x7, 0x1, 0xfffffffffffffff9, 0x7f, 0x4cd0cb9f, 0x4f5, 0x6]}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x2, 0xffffffffffff8000, 0x7708, 'snmp_trap\x00', 'syz0\x00', 0xfffffffffffffff4}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, 0x3}, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='\x00', 0x7) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000400)="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", 0x200) sendfile(r2, r3, 0x0, 0x10000) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x1b, 0x1}, 0x7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffffa0}}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0}}, {{&(0x7f0000000080)=@vsock, 0x80, 0x0}}], 0x2, 0x0) 12:33:03 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 12:33:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) syz_genetlink_get_family_id$tipc2(0x0) listen(r1, 0x0) r2 = accept(r1, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000180)=0x5, 0x4) write$cgroup_int(r2, 0x0, 0x0) 12:33:04 executing program 5: pipe(0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) syz_genetlink_get_family_id$tipc2(0x0) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000180)=0x5, 0x4) write$cgroup_int(r1, 0x0, 0x0) [ 1053.356163] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: rcu_dynticks_curr_cpu_in_eqs+0x169/0x170 [ 1053.368032] CPU: 1 PID: 28859 Comm: syz-executor2 Not tainted 5.0.0-rc2+ #27 [ 1053.375214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1053.384560] Call Trace: [ 1053.388370] Kernel Offset: disabled [ 1053.392001] Rebooting in 86400 seconds..