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"/4080], 0xff0) socket$nl_route(0x10, 0x3, 0x0) 18:43:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x800000000000000, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:43:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61000000]}, 0x48) 18:43:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000]}, 0x48) 18:43:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0xa00000000000000, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:43:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 18:43:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x10000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:43:59 executing program 0: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0xff0) [ 3014.809324][ T27] audit: type=1804 audit(1565117039.755:3675): pid=8817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1327/memory.events" dev="sda1" ino=17585 res=1 18:43:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x71000000]}, 0x48) [ 3015.052175][ T8819] IPVS: ftp: loaded support on port[0] = 21 [ 3016.073754][ T27] audit: type=1804 audit(1565117041.015:3676): pid=8810 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1327/memory.events" dev="sda1" ino=17585 res=1 [ 3016.113038][ T27] audit: type=1804 audit(1565117041.045:3677): pid=8813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1327/memory.events" dev="sda1" ino=17585 res=1 [ 3016.257849][ T27] audit: type=1804 audit(1565117041.195:3678): pid=8817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1327/memory.events" dev="sda1" ino=17585 res=1 [ 3016.315160][ T27] audit: type=1800 audit(1565117041.235:3679): pid=8817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17585 res=0 18:44:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x31000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:01 executing program 0: r0 = socket(0x11, 0x800000003, 0x81) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000)=0x1, 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/4080], 0xff0) 18:44:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0xe00000000000000, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcaa090000000000]}, 0x48) 18:44:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x20000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x73000000]}, 0x48) 18:44:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x1000000000000000, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) 18:44:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x48) 18:44:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x2c010000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:01 executing program 0: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/4073], 0xff0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) bind$can_raw(r0, &(0x7f0000000000), 0x10) [ 3016.816553][ T8862] IPVS: ftp: loaded support on port[0] = 21 18:44:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x4000000000000000, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3016.938360][ T27] audit: type=1804 audit(1565117041.875:3680): pid=8859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1328/memory.events" dev="sda1" ino=17913 res=1 [ 3017.869651][ T27] audit: type=1804 audit(1565117042.815:3681): pid=8862 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1328/memory.events" dev="sda1" ino=17913 res=1 18:44:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x31004) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x32000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) 18:44:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff]}, 0x48) 18:44:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0xff00000000000000, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:03 executing program 0: r0 = socket(0x11, 0x800010005, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0xff0) socket(0x9, 0x0, 0x101) 18:44:03 executing program 0: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0xff0) 18:44:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0xffffffff00000000, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 18:44:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff]}, 0x48) 18:44:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x3f000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3018.478324][ T27] audit: type=1804 audit(1565117043.425:3682): pid=8911 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1329/memory.events" dev="sda1" ino=17912 res=1 18:44:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x48) [ 3018.572014][ T8914] IPVS: ftp: loaded support on port[0] = 21 [ 3019.302464][ T27] audit: type=1804 audit(1565117044.245:3683): pid=8914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1329/memory.events" dev="sda1" ino=17912 res=1 18:44:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc9b60800]}, 0x48) 18:44:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4f, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:04 executing program 0: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) close(r0) getsockopt$inet_opts(r2, 0x0, 0x4, 0x0, &(0x7f00000015c0)=0x3c7) write$binfmt_aout(r0, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], 0xff0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) sendfile(r1, r3, &(0x7f0000000080), 0x100000000) 18:44:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x40000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) 18:44:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3100c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x51, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300000000000000]}, 0x48) 18:44:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xcec30800]}, 0x48) 18:44:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x60000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:04 executing program 0: r0 = socket(0x11, 0x800000003, 0x81) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000004c0)) bind(r0, &(0x7f0000000100)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'ccm-aes-ce\x00'}, 0x80) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000001c0)=0x3, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800080}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb0, 0x28, 0x400, 0x70bd29, 0x25dfdbfc, {0x11}, [@generic="bae14539c4ecac67b9b9e8daff9fc46f7ca534cbcd3a2d28435fd3a5d613d1f356146de45a15611508538e058467789c33ee9973b7aa032a394e69661717e2623e6f9f852c29dadf4ba1019c457ed1cd5a07bc188eb98619135ac278cce2bcec6ac839f926b01b612d8215b0d3227103a98ecd79e6ca741f9da0f029281fc61164907e4e4dc66c306e88b0fd2bb57002b0ba325635656e1ab20e58cd"]}, 0xb0}, 0x1, 0x0, 0x0, 0x1}, 0x1) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r2, 0x120, 0x70bd2d, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0xf0be692aa70c54a7}, 0x0) write$binfmt_aout(r0, &(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0xff0) 18:44:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5f, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3019.995301][ T8958] IPVS: ftp: loaded support on port[0] = 21 18:44:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, 0x48) [ 3020.091623][ T27] audit: type=1804 audit(1565117045.035:3684): pid=8954 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1330/memory.events" dev="sda1" ino=17909 res=1 18:44:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff]}, 0x48) 18:44:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x60, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x8dffffff, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:05 executing program 0: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/4080], 0xff0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0x10) [ 3021.617106][ T27] audit: type=1804 audit(1565117046.555:3685): pid=8999 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1330/memory.events" dev="sda1" ino=17909 res=1 [ 3021.655647][ T27] audit: type=1804 audit(1565117046.595:3686): pid=8954 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1330/memory.events" dev="sda1" ino=17909 res=1 [ 3021.691091][ T27] audit: type=1804 audit(1565117046.595:3687): pid=9001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1330/memory.events" dev="sda1" ino=17909 res=1 [ 3021.720812][ T9002] IPVS: ftp: loaded support on port[0] = 21 18:44:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 18:44:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 18:44:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xb4050000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3101c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:06 executing program 0: r0 = socket(0x3, 0x2, 0x180) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) pselect6(0x40, &(0x7f0000000000)={0x0, 0x20, 0x823, 0x7ff, 0x8, 0x3, 0xfff}, &(0x7f0000000040)={0x4, 0x8, 0x1, 0x9ce0, 0x11d, 0x8, 0x0, 0x6a9365b8}, &(0x7f0000000080)={0x10000, 0x7, 0x4, 0x1000, 0x9, 0x4af3, 0x10000, 0x3}, &(0x7f00000000c0), &(0x7f00000001c0)={&(0x7f0000000180)={0x1}, 0x8}) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/4080], 0xff0) 18:44:07 executing program 0: bind(0xffffffffffffffff, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001280)=ANY=[@ANYBLOB="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"/4083], 0xff0) 18:44:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x62, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 18:44:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xb6050000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3022.288457][ T9021] IPVS: ftp: loaded support on port[0] = 21 18:44:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f0000]}, 0x48) 18:44:07 executing program 0: [ 3022.350297][ T27] audit: type=1804 audit(1565117047.295:3688): pid=9019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1331/memory.events" dev="sda1" ino=17948 res=1 18:44:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x63, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xe4ffffff, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 18:44:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}, 0x48) [ 3023.702302][ T27] audit: type=1804 audit(1565117048.645:3689): pid=9021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1331/memory.events" dev="sda1" ino=17948 res=1 18:44:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x100300) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6b, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:08 executing program 0: 18:44:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202000000000000]}, 0x48) 18:44:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xf5ffffff, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) 18:44:09 executing program 0: 18:44:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000]}, 0x48) 18:44:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xfc000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6d, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9c]}, 0x48) 18:44:09 executing program 0: [ 3024.452838][ T9081] IPVS: ftp: loaded support on port[0] = 21 [ 3024.504774][ T27] audit: type=1804 audit(1565117049.445:3690): pid=9073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1332/memory.events" dev="sda1" ino=16825 res=1 [ 3025.263297][ T27] audit: type=1804 audit(1565117050.205:3691): pid=9073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1332/memory.events" dev="sda1" ino=16825 res=1 18:44:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x200000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xfe800000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0x18}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f]}, 0x48) 18:44:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000]}, 0x48) 18:44:10 executing program 0: 18:44:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xffffff85}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:10 executing program 0: 18:44:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x48) 18:44:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000]}, 0x48) 18:44:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xfec00000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x2}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3025.997356][ T9124] IPVS: ftp: loaded support on port[0] = 21 [ 3026.615836][ T27] audit: type=1804 audit(1565117051.555:3692): pid=9121 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1333/memory.events" dev="sda1" ino=16825 res=1 [ 3027.206985][ T27] audit: type=1804 audit(1565117052.145:3693): pid=9124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1333/memory.events" dev="sda1" ino=16825 res=1 [ 3027.267783][ T27] audit: type=1804 audit(1565117052.205:3694): pid=9110 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1333/memory.events" dev="sda1" ino=16825 res=1 [ 3027.299463][ T27] audit: type=1804 audit(1565117052.245:3695): pid=9130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1333/memory.events" dev="sda1" ino=16825 res=1 [ 3027.327711][ T9121] IPVS: ftp: loaded support on port[0] = 21 18:44:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffabfff000]}, 0x48) 18:44:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x3}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3101c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000]}, 0x48) 18:44:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xff000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x8}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 18:44:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 18:44:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xffffff8d, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3028.011742][ T27] audit: type=1804 audit(1565117052.955:3696): pid=9153 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1751/memory.events" dev="sda1" ino=17958 res=1 [ 3028.029363][ T9156] IPVS: ftp: loaded support on port[0] = 21 18:44:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xa}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3028.070956][ T9163] IPVS: ftp: loaded support on port[0] = 21 18:44:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98990a0000000000]}, 0x48) [ 3028.794752][ T27] audit: type=1804 audit(1565117053.735:3697): pid=9159 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1334/memory.events" dev="sda1" ino=16485 res=1 [ 3029.452028][ T27] audit: type=1804 audit(1565117054.395:3698): pid=9159 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1334/memory.events" dev="sda1" ino=16485 res=1 [ 3029.506545][ T27] audit: type=1804 audit(1565117054.425:3699): pid=9165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1334/memory.events" dev="sda1" ino=16485 res=1 [ 3029.510244][ T9159] IPVS: ftp: loaded support on port[0] = 21 18:44:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xe}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) 18:44:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000]}, 0x48) 18:44:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xb4050000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xffffffe4, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x10}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xfffffff5, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 18:44:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3100c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000]}, 0x48) [ 3030.110327][ T9205] IPVS: ftp: loaded support on port[0] = 21 18:44:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x300}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3030.434772][ T9222] IPVS: ftp: loaded support on port[0] = 21 [ 3030.514087][ T27] audit: type=1804 audit(1565117055.455:3700): pid=9220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1753/memory.events" dev="sda1" ino=16887 res=1 [ 3030.792463][ T27] audit: type=1804 audit(1565117055.735:3701): pid=9200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1335/memory.events" dev="sda1" ino=16485 res=1 [ 3031.400175][ T27] audit: type=1804 audit(1565117056.345:3702): pid=9200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1335/memory.events" dev="sda1" ino=16485 res=1 [ 3031.444380][ T27] audit: type=1804 audit(1565117056.365:3703): pid=9210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1335/memory.events" dev="sda1" ino=16485 res=1 18:44:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x8000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x202f0000000000]}, 0x48) 18:44:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x48) 18:44:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xa00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xe00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x1000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 18:44:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000]}, 0x48) [ 3032.013864][ T27] audit: type=1804 audit(1565117056.955:3704): pid=9243 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1336/memory.events" dev="sda1" ino=16579 res=1 [ 3032.042057][ T9246] IPVS: ftp: loaded support on port[0] = 21 18:44:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x2000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x10000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3032.467881][ T9269] IPVS: ftp: loaded support on port[0] = 21 [ 3032.511505][ T27] audit: type=1804 audit(1565117057.455:3705): pid=9266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1754/memory.events" dev="sda1" ino=16902 res=1 [ 3033.694702][ T27] audit: type=1804 audit(1565117058.635:3706): pid=9246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1336/memory.events" dev="sda1" ino=16579 res=1 [ 3033.725023][ T27] audit: type=1804 audit(1565117058.675:3707): pid=9240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1336/memory.events" dev="sda1" ino=16579 res=1 [ 3033.779827][ T9249] IPVS: ftp: loaded support on port[0] = 21 [ 3034.210817][ T27] audit: type=1804 audit(1565117059.155:3708): pid=9246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1336/memory.events" dev="sda1" ino=16579 res=1 [ 3034.237895][ T27] audit: type=1800 audit(1565117059.155:3709): pid=9246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16579 res=0 18:44:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f000000000000]}, 0x48) 18:44:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000]}, 0x48) 18:44:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x100000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x4000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x4000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xff00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}, 0x48) 18:44:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 18:44:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x200000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3035.894356][ T9301] IPVS: ftp: loaded support on port[0] = 21 18:44:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x200000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3035.973835][ T9302] IPVS: ftp: loaded support on port[0] = 21 18:44:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe02e0000000000]}, 0x48) 18:44:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 18:44:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x300000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffabff030000]}, 0x48) [ 3037.820720][ T27] audit: type=1804 audit(1565117062.765:3710): pid=9296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1337/memory.events" dev="sda1" ino=16888 res=1 [ 3037.846634][ T27] audit: type=1800 audit(1565117062.765:3711): pid=9296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16888 res=0 [ 3038.376885][ T27] audit: type=1804 audit(1565117063.315:3712): pid=9294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1755/memory.events" dev="sda1" ino=16916 res=1 [ 3038.405110][ T27] audit: type=1800 audit(1565117063.315:3713): pid=9294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16916 res=0 [ 3041.085743][ T27] audit: type=1804 audit(1565117066.025:3714): pid=9301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1337/memory.events" dev="sda1" ino=16888 res=1 18:44:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x4100300) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) [ 3041.123768][ T27] audit: type=1804 audit(1565117066.025:3715): pid=9303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1337/memory.events" dev="sda1" ino=16888 res=1 18:44:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 18:44:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x400000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x2000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x3000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 18:44:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 18:44:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x500000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3041.485962][ T9362] IPVS: ftp: loaded support on port[0] = 21 18:44:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x8000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3041.526122][ T9360] IPVS: ftp: loaded support on port[0] = 21 18:44:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) [ 3043.786048][ T27] audit: type=1804 audit(1565117068.725:3716): pid=9356 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1756/memory.events" dev="sda1" ino=16657 res=1 [ 3043.811839][ T27] audit: type=1800 audit(1565117068.725:3717): pid=9356 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16657 res=0 [ 3043.832314][ T27] audit: type=1804 audit(1565117068.725:3718): pid=9357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1338/memory.events" dev="sda1" ino=16833 res=1 [ 3043.857948][ T27] audit: type=1800 audit(1565117068.725:3719): pid=9357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16833 res=0 [ 3046.491699][ T27] audit: type=1804 audit(1565117071.435:3720): pid=9392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1338/memory.events" dev="sda1" ino=16833 res=1 [ 3046.517002][ T27] audit: type=1804 audit(1565117071.435:3721): pid=9394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1338/memory.events" dev="sda1" ino=16833 res=1 18:44:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x5000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0x9, &(0x7f0000000000)={@local={0xac, 0x14, 0x0}}, 0x8) recvfrom$inet(r0, 0x0, 0x800e813f, 0x0, 0x0, 0x800e007be) shutdown(r0, 0x0) 18:44:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xa000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 18:44:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x600000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 18:44:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 18:44:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xe000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 18:44:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 18:44:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x700000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3046.977855][ T9421] IPVS: ftp: loaded support on port[0] = 21 18:44:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x10000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3047.842302][ T27] audit: type=1804 audit(1565117072.785:3722): pid=9415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1339/memory.events" dev="sda1" ino=16931 res=1 [ 3047.877873][ T27] audit: type=1800 audit(1565117072.815:3723): pid=9415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16931 res=0 [ 3049.183958][ T27] audit: type=1804 audit(1565117074.125:3724): pid=9445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1339/memory.events" dev="sda1" ino=16931 res=1 18:44:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x6000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3049.210267][ T27] audit: type=1804 audit(1565117074.125:3725): pid=9446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1339/memory.events" dev="sda1" ino=16931 res=1 18:44:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x40000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 18:44:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 18:44:34 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0xfffffffffffffffc, @local, 'ip_vti0\x00'}}, 0x1e) 18:44:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x800000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:34 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 18:44:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x900000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xff000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 18:44:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) [ 3049.565136][ T9474] IPVS: ftp: loaded support on port[0] = 21 18:44:34 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00\xe7\xce]tcS>\x93-\t/5\xc7\xf7\xd09&\xa3B\xf1\x06\x00\x00~\xb3\x9a\x0esV\x7f6\xba\xf2\xa0\xab\xfa\x1f+\xf8=\"\x1e\x1f\xe7\x8e\xa42\xe2H\xfe\x9f\x92\x9a5\x90G\xbd\x93\x80\x8c\xa3\xcbB\x91K\xa3\xda\xd5\xab\xeb\xd2?G\xaeNN\xd0\xf7\x81,9?\\\x12m\xef\xdci\x8a\x87.)\xab\xadwD\xfa\xef\xd9\xad\x18\x01\x97\x89\xb2\x05d\"\xbaQ\xf3G\x14`\xe9\xe1\xe3\xe8\xcd\x18\x84\x91\x87\xe9h\xac^)5\x94\\\xe0\b\xd4\x83Q\xee\x15q@\xe1\xc2\xdd\xc7\xb8\xfc\x7f4nh\xec\x88\xe9A\x8d\xf4\xac,\t\xfbR\xfbp!\x1a\x86\x1dN\x81\xac\xa8\x98\a,\n\x9dd\x04S\"\x0f\xb5\x1c6\xe1\xb2', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) pwrite64(r1, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x3200) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 3050.520087][ T27] audit: type=1804 audit(1565117075.465:3726): pid=9467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1340/memory.events" dev="sda1" ino=16951 res=1 [ 3050.555962][ T27] audit: type=1800 audit(1565117075.485:3727): pid=9467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16951 res=0 [ 3052.544574][ T27] audit: type=1804 audit(1565117077.485:3728): pid=9519 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1340/memory.events" dev="sda1" ino=16951 res=1 18:44:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x1000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x48) 18:44:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xa00000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) [ 3052.571141][ T27] audit: type=1804 audit(1565117077.485:3729): pid=9523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1340/memory.events" dev="sda1" ino=16951 res=1 18:44:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x20000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) 18:44:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xe00000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) [ 3052.955184][ T9557] IPVS: ftp: loaded support on port[0] = 21 18:44:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x100000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 18:44:39 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00\xe7\xce]tcS>\x93-\t/5\xc7\xf7\xd09&\xa3B\xf1\x06\x00\x00~\xb3\x9a\x0esV\x7f6\xba\xf2\xa0\xab\xfa\x1f+\xf8=\"\x1e\x1f\xe7\x8e\xa42\xe2H\xfe\x9f\x92\x9a5\x90G\xbd\x93\x80\x8c\xa3\xcbB\x91K\xa3\xda\xd5\xab\xeb\xd2?G\xaeNN\xd0\xf7\x81,9?\\\x12m\xef\xdci\x8a\x87.)\xab\xadwD\xfa\xef\xd9\xad\x18\x01\x97\x89\xb2\x05d\"\xbaQ\xf3G\x14`\xe9\xe1\xe3\xe8\xcd\x18\x84\x91\x87\xe9h\xac^)5\x94\\\xe0\b\xd4\x83Q\xee\x15q@\xe1\xc2\xdd\xc7\xb8\xfc\x7f4nh\xec\x88\xe9A\x8d\xf4\xac,\t\xfbR\xfbp!\x1a\x86\x1dN\x81\xac\xa8\x98\a,\n\x9dd\x04S\"\x0f\xb5\x1c6\xe1\xb2', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) pwrite64(r1, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x3200) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000000000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 3054.815144][ T27] audit: type=1804 audit(1565117079.755:3730): pid=9509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1761/memory.events" dev="sda1" ino=16488 res=1 [ 3054.843230][ T27] audit: type=1800 audit(1565117079.755:3731): pid=9509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16488 res=0 [ 3054.875282][ T27] audit: type=1804 audit(1565117079.755:3732): pid=9510 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1761/memory.events" dev="sda1" ino=16488 res=1 [ 3054.909379][ T27] audit: type=1804 audit(1565117079.755:3733): pid=9521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1761/memory.events" dev="sda1" ino=16488 res=1 [ 3054.936047][ T27] audit: type=1804 audit(1565117079.795:3734): pid=9553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1341/memory.events" dev="sda1" ino=16962 res=1 [ 3054.967566][ T27] audit: type=1800 audit(1565117079.795:3735): pid=9553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16962 res=0 [ 3056.175309][ T27] audit: type=1804 audit(1565117081.115:3736): pid=9574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1341/memory.events" dev="sda1" ino=16962 res=1 18:44:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x8000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3056.208430][ T27] audit: type=1804 audit(1565117081.115:3737): pid=9575 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1341/memory.events" dev="sda1" ino=16962 res=1 [ 3056.240909][ T27] audit: type=1804 audit(1565117081.155:3738): pid=9582 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1762/memory.events" dev="sda1" ino=16678 res=1 18:44:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x1000000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 18:44:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x48) 18:44:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x200000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001480)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@typedef, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "8bea"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "11c6"}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000480)=""/4096, 0x45, 0x1000, 0x1}, 0x20) 18:44:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x48) [ 3056.433152][ T27] audit: type=1800 audit(1565117081.155:3739): pid=9582 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16678 res=0 18:44:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x6000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x2000000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x300000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23]}, 0x48) 18:44:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) [ 3056.722599][ T9602] IPVS: ftp: loaded support on port[0] = 21 [ 3056.963825][ T9622] IPVS: ftp: loaded support on port[0] = 21 [ 3060.294564][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 3060.294595][ T27] audit: type=1804 audit(1565117085.235:3744): pid=9629 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1342/memory.events" dev="sda1" ino=16974 res=1 [ 3060.326442][ T27] audit: type=1804 audit(1565117085.235:3745): pid=9630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1342/memory.events" dev="sda1" ino=16974 res=1 18:44:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x2c01000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x800000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, 0x48) 18:44:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x9000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 18:44:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x800000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xa00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x48) 18:44:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 18:44:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x3200000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x10000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xe00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3062.212128][ T9657] IPVS: ftp: loaded support on port[0] = 21 18:44:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2100000000000000]}, 0x48) 18:44:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}, 0x48) 18:44:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x3f00000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3063.000993][ T27] audit: type=1804 audit(1565117087.945:3746): pid=9655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1343/memory.events" dev="sda1" ino=16977 res=1 [ 3064.960044][ T27] audit: type=1800 audit(1565117089.905:3747): pid=9655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16977 res=0 18:44:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xa000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2300000000000000]}, 0x48) 18:44:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x1000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63]}, 0x48) 18:44:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x4000000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3100c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x4000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, 0x48) 18:44:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71]}, 0x48) 18:44:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x6000000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3065.376640][ T9711] IPVS: ftp: loaded support on port[0] = 21 18:44:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xff00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3065.475885][ T9712] IPVS: ftp: loaded support on port[0] = 21 18:44:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) [ 3067.679562][ T27] audit: type=1804 audit(1565117092.625:3748): pid=9705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1344/memory.events" dev="sda1" ino=17004 res=1 [ 3067.706099][ T27] audit: type=1800 audit(1565117092.625:3749): pid=9705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17004 res=0 [ 3067.726869][ T27] audit: type=1804 audit(1565117092.655:3750): pid=9708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1767/memory.events" dev="sda1" ino=17000 res=1 [ 3067.752781][ T27] audit: type=1800 audit(1565117092.655:3751): pid=9708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17000 res=0 [ 3069.029209][ T27] audit: type=1804 audit(1565117093.965:3752): pid=9731 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1344/memory.events" dev="sda1" ino=17004 res=1 [ 3069.054306][ T27] audit: type=1804 audit(1565117093.975:3753): pid=9733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1344/memory.events" dev="sda1" ino=17004 res=1 18:44:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x8dffffff00000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3100c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73]}, 0x48) 18:44:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0xffffffff00000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xb000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:44:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 18:44:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xb405000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:44:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x2}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:44:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 18:44:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x252]}, 0x48) [ 3070.864117][ T9753] IPVS: ftp: loaded support on port[0] = 21 18:44:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x3}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3070.957249][ T9766] IPVS: ftp: loaded support on port[0] = 21 18:44:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5202000000000000]}, 0x48) 18:44:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) [ 3073.097139][ T27] audit: type=1804 audit(1565117098.035:3754): pid=9751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1345/memory.events" dev="sda1" ino=16689 res=1 [ 3073.124641][ T27] audit: type=1800 audit(1565117098.065:3755): pid=9751 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16689 res=0 [ 3073.155224][ T27] audit: type=1804 audit(1565117098.095:3756): pid=9762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1768/memory.events" dev="sda1" ino=16489 res=1 [ 3073.192242][ T27] audit: type=1800 audit(1565117098.095:3757): pid=9762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16489 res=0 [ 3074.501659][ T27] audit: type=1804 audit(1565117099.445:3758): pid=9785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1345/memory.events" dev="sda1" ino=16689 res=1 [ 3074.527187][ T27] audit: type=1804 audit(1565117099.445:3759): pid=9787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1345/memory.events" dev="sda1" ino=16689 res=1 18:45:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3100c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xb605000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x8}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 18:45:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000]}, 0x48) 18:45:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xc000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000]}, 0x48) 18:45:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xa}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 18:45:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xe4ffffff00000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000]}, 0x48) [ 3076.406749][ T9820] IPVS: ftp: loaded support on port[0] = 21 18:45:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xe}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3076.494156][ T9822] IPVS: ftp: loaded support on port[0] = 21 [ 3078.558213][ T27] audit: type=1804 audit(1565117103.495:3760): pid=9819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1769/memory.events" dev="sda1" ino=17006 res=1 [ 3078.602045][ T27] audit: type=1804 audit(1565117103.495:3761): pid=9813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1346/memory.events" dev="sda1" ino=16865 res=1 [ 3078.628326][ T27] audit: type=1800 audit(1565117103.495:3763): pid=9813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16865 res=0 [ 3078.649258][ T27] audit: type=1800 audit(1565117103.495:3762): pid=9819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17006 res=0 [ 3081.254287][ T27] audit: type=1804 audit(1565117106.195:3764): pid=9839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1346/memory.events" dev="sda1" ino=16865 res=1 18:45:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xb000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 18:45:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xf5ffffff00000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000]}, 0x48) 18:45:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x10}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3081.318061][ T27] audit: type=1804 audit(1565117106.195:3765): pid=9837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1346/memory.events" dev="sda1" ino=16865 res=1 18:45:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xc100300) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x300}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 18:45:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 18:45:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xfc00000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000]}, 0x48) 18:45:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xa00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3081.831610][ T9863] IPVS: ftp: loaded support on port[0] = 21 [ 3081.914418][ T9870] IPVS: ftp: loaded support on port[0] = 21 [ 3082.600738][ T27] audit: type=1804 audit(1565117107.545:3766): pid=9868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1770/memory.events" dev="sda1" ino=17021 res=1 [ 3082.720943][ T9888] IPVS: ftp: loaded support on port[0] = 21 [ 3084.063262][ T27] audit: type=1804 audit(1565117109.005:3767): pid=9887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1347/memory.events" dev="sda1" ino=17015 res=1 [ 3084.089023][ T27] audit: type=1800 audit(1565117109.005:3768): pid=9887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17015 res=0 [ 3084.461870][ T27] audit: type=1800 audit(1565117109.405:3769): pid=9868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17021 res=0 18:45:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 18:45:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x48) 18:45:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000]}, 0x48) 18:45:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xfe80000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xe00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xd000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc9b6080000000000]}, 0x48) 18:45:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x2000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xfec0000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x48) 18:45:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xa000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x4000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xcec3080000000000]}, 0x48) 18:45:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x48) 18:45:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xff00000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3087.332426][ T9930] IPVS: ftp: loaded support on port[0] = 21 18:45:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x48) 18:45:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xff00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3087.471597][ T9941] IPVS: ftp: loaded support on port[0] = 21 [ 3089.610340][ T27] audit: type=1804 audit(1565117114.555:3770): pid=9937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1772/memory.events" dev="sda1" ino=17047 res=1 [ 3089.636055][ T27] audit: type=1800 audit(1565117114.555:3771): pid=9937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17047 res=0 [ 3089.656470][ T27] audit: type=1804 audit(1565117114.555:3772): pid=9927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1348/memory.events" dev="sda1" ino=17049 res=1 [ 3089.683248][ T27] audit: type=1800 audit(1565117114.555:3773): pid=9927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17049 res=0 [ 3090.942624][ T27] audit: type=1804 audit(1565117115.885:3774): pid=9955 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1348/memory.events" dev="sda1" ino=17049 res=1 [ 3090.970707][ T27] audit: type=1804 audit(1565117115.905:3775): pid=9957 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1348/memory.events" dev="sda1" ino=17049 res=1 18:45:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xe000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 18:45:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0xffffffff00000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 18:45:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x200000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xc100300) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300]}, 0x48) 18:45:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f000000000000]}, 0x48) 18:45:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x2, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, 0x48) [ 3092.986993][ T9984] IPVS: ftp: loaded support on port[0] = 21 18:45:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffc8ffffffffff]}, 0x48) [ 3093.049241][ T9986] IPVS: ftp: loaded support on port[0] = 21 [ 3095.031133][ T27] audit: type=1804 audit(1565117119.975:3776): pid=9979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1349/memory.events" dev="sda1" ino=17063 res=1 [ 3095.077808][ T27] audit: type=1800 audit(1565117119.975:3777): pid=9979 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17063 res=0 [ 3095.105785][ T27] audit: type=1804 audit(1565117119.975:3778): pid=9982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1773/memory.events" dev="sda1" ino=17057 res=1 [ 3095.141808][ T27] audit: type=1800 audit(1565117119.975:3779): pid=9982 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17057 res=0 [ 3097.744220][ T27] audit: type=1804 audit(1565117122.685:3780): pid=10007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1349/memory.events" dev="sda1" ino=17063 res=1 18:45:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xf000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x3, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x2000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 18:45:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) [ 3097.776550][ T27] audit: type=1804 audit(1565117122.685:3781): pid=10009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1349/memory.events" dev="sda1" ino=17063 res=1 18:45:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 18:45:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffc8ffff]}, 0x48) 18:45:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x3000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xa000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 18:45:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x4, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3098.107068][T10029] IPVS: ftp: loaded support on port[0] = 21 18:45:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) [ 3098.618725][T10052] IPVS: ftp: loaded support on port[0] = 21 [ 3100.472395][ T27] audit: type=1804 audit(1565117125.415:3782): pid=10025 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1350/memory.events" dev="sda1" ino=17075 res=1 [ 3100.514700][ T27] audit: type=1804 audit(1565117125.445:3783): pid=10050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1774/memory.events" dev="sda1" ino=17083 res=1 [ 3100.540952][ T27] audit: type=1800 audit(1565117125.445:3784): pid=10050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17083 res=0 [ 3100.561424][ T27] audit: type=1800 audit(1565117125.445:3785): pid=10025 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17075 res=0 [ 3103.154016][ T27] audit: type=1804 audit(1565117128.095:3786): pid=10056 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1350/memory.events" dev="sda1" ino=17075 res=1 [ 3103.208320][ T27] audit: type=1804 audit(1565117128.125:3787): pid=10058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1350/memory.events" dev="sda1" ino=17075 res=1 18:45:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x10000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202]}, 0x48) 18:45:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x8000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 18:45:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x5, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x6000000000000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xa000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 18:45:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100]}, 0x48) 18:45:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xf000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x6, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3103.485904][T10079] IPVS: ftp: loaded support on port[0] = 21 18:45:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xe000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3103.964280][T10106] IPVS: ftp: loaded support on port[0] = 21 [ 3105.828060][ T27] audit: type=1804 audit(1565117130.765:3788): pid=10104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1776/memory.events" dev="sda1" ino=16506 res=1 [ 3105.882730][ T27] audit: type=1800 audit(1565117130.765:3789): pid=10104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16506 res=0 [ 3105.904873][ T27] audit: type=1804 audit(1565117130.765:3790): pid=10076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1351/memory.events" dev="sda1" ino=16785 res=1 [ 3105.931030][ T27] audit: type=1800 audit(1565117130.765:3791): pid=10076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16785 res=0 [ 3108.518671][ T27] audit: type=1804 audit(1565117133.465:3792): pid=10108 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1351/memory.events" dev="sda1" ino=16785 res=1 18:45:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x11000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3100c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300]}, 0x48) 18:45:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 18:45:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x10000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x7, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3108.550752][ T27] audit: type=1804 audit(1565117133.465:3793): pid=10110 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1351/memory.events" dev="sda1" ino=16785 res=1 18:45:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x40000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 18:45:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100]}, 0x48) 18:45:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x8, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3108.879977][T10133] IPVS: ftp: loaded support on port[0] = 21 [ 3108.935958][T10131] IPVS: ftp: loaded support on port[0] = 21 18:45:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300]}, 0x48) 18:45:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xff000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3111.222724][ T27] audit: type=1804 audit(1565117136.165:3794): pid=10129 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1352/memory.events" dev="sda1" ino=16961 res=1 [ 3111.248552][ T27] audit: type=1800 audit(1565117136.165:3795): pid=10129 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16961 res=0 [ 3111.285228][ T27] audit: type=1804 audit(1565117136.215:3796): pid=10128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1777/memory.events" dev="sda1" ino=16769 res=1 [ 3111.311201][ T27] audit: type=1800 audit(1565117136.215:3797): pid=10128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16769 res=0 [ 3112.616344][ T27] audit: type=1804 audit(1565117137.555:3798): pid=10160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1352/memory.events" dev="sda1" ino=16961 res=1 [ 3112.648313][ T27] audit: type=1804 audit(1565117137.555:3799): pid=10161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1352/memory.events" dev="sda1" ino=16961 res=1 18:45:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x12000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 18:45:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x1000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x9, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}, 0x48) 18:45:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3100c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 18:45:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xa, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x20000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) [ 3114.496935][T10188] IPVS: ftp: loaded support on port[0] = 21 18:45:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x100000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) [ 3114.581346][T10186] IPVS: ftp: loaded support on port[0] = 21 [ 3116.717426][ T27] audit: type=1804 audit(1565117141.655:3800): pid=10184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1353/memory.events" dev="sda1" ino=17086 res=1 [ 3116.743684][ T27] audit: type=1800 audit(1565117141.655:3801): pid=10184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17086 res=0 [ 3116.764830][ T27] audit: type=1804 audit(1565117141.695:3802): pid=10181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1778/memory.events" dev="sda1" ino=17025 res=1 [ 3116.791210][ T27] audit: type=1800 audit(1565117141.695:3803): pid=10181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17025 res=0 [ 3118.069731][ T27] audit: type=1804 audit(1565117143.015:3804): pid=10210 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1353/memory.events" dev="sda1" ino=17086 res=1 [ 3118.095102][ T27] audit: type=1804 audit(1565117143.015:3805): pid=10211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1353/memory.events" dev="sda1" ino=17086 res=1 18:45:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x13000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xe, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f]}, 0x48) 18:45:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x200000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x48) 18:45:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3100c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) 18:45:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9aa0c]}, 0x48) 18:45:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x300000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x10, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x800000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3120.053660][T10237] IPVS: ftp: loaded support on port[0] = 21 18:45:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9998]}, 0x48) [ 3120.096498][T10244] IPVS: ftp: loaded support on port[0] = 21 [ 3122.222863][ T27] audit: type=1804 audit(1565117147.165:3806): pid=10233 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1354/memory.events" dev="sda1" ino=16757 res=1 [ 3122.274154][ T27] audit: type=1800 audit(1565117147.165:3807): pid=10233 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16757 res=0 [ 3122.302761][ T27] audit: type=1804 audit(1565117147.195:3808): pid=10241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1779/memory.events" dev="sda1" ino=16833 res=1 [ 3122.338142][ T27] audit: type=1800 audit(1565117147.195:3809): pid=10241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16833 res=0 [ 3124.533553][ T27] audit: type=1804 audit(1565117149.475:3810): pid=10260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1354/memory.events" dev="sda1" ino=16757 res=1 [ 3124.558951][ T27] audit: type=1804 audit(1565117149.475:3811): pid=10261 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1354/memory.events" dev="sda1" ino=16757 res=1 18:45:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x14000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 18:45:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x32, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xa00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0x48) 18:45:50 executing program 0: 18:45:50 executing program 0: 18:45:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xe00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 18:45:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x60, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x48) [ 3125.356017][T10286] IPVS: ftp: loaded support on port[0] = 21 18:45:50 executing program 0: [ 3126.308134][ T27] audit: type=1804 audit(1565117151.245:3812): pid=10282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1355/memory.events" dev="sda1" ino=17115 res=1 [ 3126.358134][ T27] audit: type=1800 audit(1565117151.245:3813): pid=10282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17115 res=0 [ 3127.637246][ T27] audit: type=1804 audit(1565117152.575:3814): pid=10305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1355/memory.events" dev="sda1" ino=17115 res=1 [ 3127.662757][ T27] audit: type=1804 audit(1565117152.585:3815): pid=10306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1355/memory.events" dev="sda1" ino=17115 res=1 18:45:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x15000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x344000]}, 0x48) 18:45:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x1000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}, 0x48) 18:45:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfc, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:52 executing program 0: 18:45:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000]}, 0x48) 18:45:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x48) 18:45:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23]}, 0x48) 18:45:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x4000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x12c, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x13000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3128.152170][T10333] IPVS: ftp: loaded support on port[0] = 21 [ 3128.467533][T10350] IPVS: ftp: loaded support on port[0] = 21 [ 3130.320041][ T27] audit: type=1804 audit(1565117155.265:3816): pid=10328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1356/memory.events" dev="sda1" ino=17120 res=1 [ 3130.345761][ T27] audit: type=1800 audit(1565117155.265:3817): pid=10328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17120 res=0 [ 3130.998189][ T27] audit: type=1804 audit(1565117155.935:3818): pid=10348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1785/memory.events" dev="sda1" ino=17118 res=1 [ 3131.044716][ T27] audit: type=1800 audit(1565117155.935:3819): pid=10348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17118 res=0 [ 3131.653326][ T27] audit: type=1804 audit(1565117156.595:3820): pid=10346 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1356/memory.events" dev="sda1" ino=17120 res=1 [ 3131.688241][ T27] audit: type=1804 audit(1565117156.625:3821): pid=10354 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1356/memory.events" dev="sda1" ino=17120 res=1 18:45:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x16000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:45:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xff00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, 0x48) 18:45:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403400]}, 0x48) 18:45:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x300, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000]}, 0x48) 18:45:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0xffffffff00000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 18:45:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x500, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:45:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x2}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:45:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}, 0x48) [ 3132.139715][T10384] IPVS: ftp: loaded support on port[0] = 21 18:45:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x11000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3133.246222][T10406] IPVS: ftp: loaded support on port[0] = 21 [ 3135.721538][ T27] audit: type=1804 audit(1565117160.665:3822): pid=10405 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1786/memory.events" dev="sda1" ino=16756 res=1 [ 3135.754244][ T27] audit: type=1804 audit(1565117160.665:3823): pid=10376 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1357/memory.events" dev="sda1" ino=16737 res=1 [ 3135.780399][ T27] audit: type=1800 audit(1565117160.665:3824): pid=10405 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16756 res=0 [ 3135.801038][ T27] audit: type=1800 audit(1565117160.665:3825): pid=10376 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16737 res=0 [ 3138.138888][ T27] audit: type=1804 audit(1565117163.075:3826): pid=10398 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1357/memory.events" dev="sda1" ino=16737 res=1 [ 3138.164283][ T27] audit: type=1804 audit(1565117163.085:3827): pid=10399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1357/memory.events" dev="sda1" ino=16737 res=1 18:46:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x17000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63]}, 0x48) 18:46:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x5b4, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}, 0x48) 18:46:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x3}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x8}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71]}, 0x48) 18:46:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 18:46:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x5b6, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3138.551721][T10427] IPVS: ftp: loaded support on port[0] = 21 18:46:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xa}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73]}, 0x48) 18:46:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x16000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3139.061627][T10452] IPVS: ftp: loaded support on port[0] = 21 [ 3139.751609][ T27] audit: type=1804 audit(1565117164.695:3828): pid=10422 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1358/memory.events" dev="sda1" ino=16898 res=1 [ 3139.777539][ T27] audit: type=1800 audit(1565117164.695:3829): pid=10422 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16898 res=0 [ 3141.108477][ T27] audit: type=1804 audit(1565117166.055:3830): pid=10449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1787/memory.events" dev="sda1" ino=16833 res=1 [ 3141.138446][ T27] audit: type=1800 audit(1565117166.055:3831): pid=10449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16833 res=0 [ 3143.801979][ T27] audit: type=1804 audit(1565117168.745:3832): pid=10454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1358/memory.events" dev="sda1" ino=16898 res=1 [ 3143.835257][ T27] audit: type=1804 audit(1565117168.745:3833): pid=10456 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1358/memory.events" dev="sda1" ino=16898 res=1 18:46:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x18000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:08 executing program 0: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) close(r0) getsockopt$inet_opts(r2, 0x0, 0x4, 0x0, &(0x7f00000015c0)=0x3c7) write$binfmt_aout(r0, &(0x7f0000001600)=ANY=[@ANYBLOB="0000000000000000000000000000000043050000000000000000000000000000033c868cc0b585448feb7f0b957c28e544f0f5424f8b825991959658bdaf4ec7d5a7eb151fb515188b0f4bd6a8480654bcf34a6eb0bc2fd858d283c386344134a459261420f5980470445992a86677fb184c75fe1914de3b3a649cff43d8bebfbbd3e26ae8b1c8ae324d3c12827ce90779a4667f1e7bfa69e464ec12d745b72b51fe24adbea0bcc106f99f709f8a02db24e42f79d473c4abc7342e5427990cefe8996b41a2a3e75d27ac2602d5a81e59f86f1280d1e7e9193d4c5adabf85be0718c447be954449c8aa6c374a065ce77212555a44605574db4cd11ef0aedb4cb10102248ae5b905ff58d9bd435db07383348354fe9e55439201666ce1816ea43f80f9c622bb3800079c33d592e795ec3e50540317da813bda59ca8febac939dce7e4632e32b2565889c463f3707625bc3aab1f28731425cfee656d3bdef027041776adfd4cfb623dfef07c11cf150bffbd5a01d42e616bb2f5db484b8f3d79213ce7bd189f4dccbeffd79bf506b562abd6270daf9a881297493e649719d753a20d34dbb875a37bf46b97300b2b0c7b9bc0f853100d29394eba9981423359e478d01a0bb0434bc8cdb9f304c5792373494a79a13af9ef79f2af008d5397227ac8a96d8546bb57cf4abbe8d317446e9988d2179899f64fb8f3beace1d654cf6380f020b563d5efa6ee7988d1ff1eb1bf1ab10031eb91dec1e9c03b2b0b9348cc78190187bd4a44211b0cbb5f71ebeda812fda95099fd0ff479ba6e88a7558b3a1c4cfed5f63bda60fdd8169d51f02e4540f8918e8b1bb91f0b89ef60d311dff0fc7302ba8dc467c77db5d858cb2c0fe77a97eca1a56a0d5e612de2e66dd0b961ec2375c2cdef76c5b4b1adcbf1a351bbcd604c3bd211477365d8593d27d00ba1e00644d86f9aebe9ab483debdf2baa3c9f6141dbb6b44890f17193d3786e6f1fb5e16369951f56b98042f022abd89ac9960da769fd41812f7c7403c308f2f50f6f0688904fb6167a5d1772d1b57b65b2e252ffd5873e7afe6d80fab9f09b9fe15ea8c4627484020bd95348a3ebcef4ed15df332842ab122a6351bc7e2468bf70bd9457c45c05d0549464929b5856252e6bff1a2994dbb8d5c4efd2690b7a37ce299f322539fe319c8f108dd3390d23f25b31a2a32bfb932815caf9f5a84fb4e955611ada2cd6ac09048915c396ae191030000002a47328a0f7941c9670d21643df8a244edd68ea1dd8345b4c14e72f7d46f173b73075f3346b515aac86caed3ea3b1d37a7e9477affd2a4c4cbd9df5b7dc8b257d4b73c0bbd800b579badf52ae54160f3f18b216768fe1eda5928d7a5ecd0fe34787f68b19af5b8b4bb1e941bc067dcacff93b1e402f440008d9ce65a0e58614282ad7d8adb38b8c19eb9ccf17b0173ea85b3aaa6f6a04c105d50d073ba246fbd46f9dcd50c662e49ad745a37dcd2fdaf36b9e73dfe4566671e747ec08cb273582ce3b7fc303a4f1e6327ad0fdd7d98460e4fcab0381bdb2e9ad6a13b0a04137cc1b89a7255b3c025427f862a4f28be716791b927191ae9ce9145a0ecfaa6593067bfba895d93fb411664777adf295f237bf0c2feee666ef7a913135dc658cf8a433bda2e39e726e7a294178dace3bdd5d63d836bcf29190113bca45d769f30ae6f10c81eebc9ca5003e2735305e8627b37329ec9b1f6e8d8ee00adf45a331b34b4e61a06970a5cab6cd3630b7b499261087a472d85b764bff568242d2b1270ecc3fcb4d278cff03a51f2c42b99ce140be7418788127d8d56055b73a6e73c316b173f5f1675b3585d96e88f1e2f55c93cb9bd0fdd84974341cbd1d05a080f3c6474d93b6959063620f498b7499c844fccde043e8296f74ec575b0f43c78548d4a5dcea7686a761982db350c7af1b9f5feb08947c67b3754d4b625964a3ac502d95708893dffe231ce5867425a439b18b3605c34e2cb151c3dabc540239ff0c4c504d0a7bdb0c779c1dd6804b5f613145ce7913801bef08ba3c93b8739e14bc7d79ec745609e60fb5927c7d7ce9036586230cbbf67796fc419e659f421f5d353230c7fc3fa031cd8795b326d311fa265a6432e28e46da42bc1e86476a8f851d8343e8bbffbefd42a5c93657f60a03272a33378125e9ae47dc3248c0ffcd383158e0abae54c53ec5ce9d3ce0dca7b9e783d28984ab7b222a88342d7488210bb7731a5b8dce937ac6ee92d9ccf04d28877eefe6992f025779b51e15c7464482f3533ced2453f0f33dea9d3ce1136bf25d118269586690624420bfedda8f6ffa4639bf551d65823cb08c78eda94549134a1d7e5be36d3eb733d68ab2b65f291fd8256b1a5c39c014094dcc95e39994f82a8c1f53e1fc620d774889e5a014ac345ddc495026d679c9491c6adcd4f04fb99e53a2c52886ba31ee706a84f86483621f0807c4ab58ef8be10b1148db32489b58edc81a07b04107113818c6e8f348aee2da92accb26451e11e5c61cc948ccd5500f2228cb627ae71c1f78e2508d63d1938c2f5ffd1e0e2b4fb97fe28643580a698df15e436ff4cc0a88497433cc54b0c81c368fe96d32d24439fe1c10fce1557a6e3c4cca31c7fabede562a19b6b645152c9fa1742743beab33b0abf16b1ec44a6870e325d3b1c75555a58bd9d8ae3054674f872f191e95786acfc1c5f81d9f38dfcd84cc9e11c59042f5aef670dd3985f359c64ce9815b121288fda2194310162740176e1c9615bf0285a944f05098dbd9bb1edddcd058f9ca7893c3a5a50bdaad5f203b9448e4dddc8e99ef06848eb441889c9fe733d42b68f884dd5ec3f6eebaac9e44fd550ddb12d81a415fcbb7754b052154d7a92ac285d2bcc8932f1ea912486479e4b143a1a201b5257375509dc3ad36d538dc676b62296ef2162fd05f106522c583410ad7462106ded7e1bda9bb9d5e938590bcc84a387b31bb6207e79b2e20b633d165b4c270c86edd0b679cd4fdc16a4d75a0b6be9d536cbf8ffc9d1b26a2d89e6a8b3fc12d6ee3cdad67853a25a9147ec45d75aa2ae441a865eb11310ef97eb2eba82a23d5f1fc5e3c3b13c100d93c3fb86d536ee66065e503b7068640724dbbc977f43124d077673758d75c6bd31ab149733a030378d72f9d8d79ef45bd7bff6f49b1605adae7f46582e66a1d596675539df2335ecb5a6b8f7228098a9bd6ad658fb79897bfb8b3e986bd3dd3cc767a587f6a04e2ec139f1c61ab1ed00d5be0f6fd1cbef7e034012d04cecdce8cc2463e016a781bcb0e41de42359e1366d538eb918fe22c6b4d6280b4d8b393d741cd8b05b63035bcf7e9f92a98dc0428b7714dbab4789b3f8c79d438f0eae3cd1380d1f35b8aef3a012bb26b76befdb923d53481c02f90edd0c0912378cc6b23b0d6b9ba34afa3b3a23bd806e586887919193adee5bf2e5ea096592df747b0f866a1852fd2183ff6eedda3a6a9400dcb0af43a773bb988f0272c2a28d3a637b4a9916a64bbb4ed163b862b71b1583f81b6cc88aed8ef8edd41756ff1f4c97674c68a84e7b4812220d2f5939e62a3eee9e7884af3d0f7e2453c27a5157581cfc785680877a2308649d8fbc3ffae0d5541d90c801771efae27ec6427e84b562dadea2c49e0c78552bb95e91cf7b21dfe0a110b3b0bddf911fad182c09283be2aa35e090d06fa8876f9ba11597f7f7551e8c496cb56188e4a770cb3916e659e0d6900509c1040973553d2bb888d4b394f5db1c4c473955d3004ad868c502f23f5d2f1f04c9ff3f98e830400a0f033edef20a6f1e190f2e506828b83f971c282e51bfea9c603192e2a500a02ae40c91578773c381749f242e0aec3fa45408b9711681880a4e125d90cf5bfa728c7340a490053142caa35e913d0e3d8fdb0bbd70144007b2a0e58f3c3d075a750812303b2f527b232af0b9a832e7f1f20a75f637d1b19afe59e52c758583a4fdeab9bb6041d834eeffcb8c710fda11054ab4c09d06ff3228fca2a8558855779f1a1d78103a99d5975fb4122603abffb7bf351df67647f74a92d4f2cc46c665104f89c1e5a0140b388c49f92382fad939806bd5341c8532d06256afb6a6e1629253c7d35ab5949f75db8df38777964ffc0474b09b611a3efd63efba1283e468bc8b1ee428acb0bdd91cc821054dbf584b579a3c7b520fe31f797d13622ae6c74be825dd6ab9c9d4c547a7bb45db6c9ee3b9f2bace29bf80e3b72c4e18cf1ca8655bbff8940354d5d126510c6b6edb650da9183af2df9e71cce6149e99cb61ccbefd34744501a5d3b4a1fbd77426466ded547d8e3fc29a6bce204c74b8171fc22c5d9f76d300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000806aaa9ef413967021d09ba474d7c039eeb126ba94a0016bc712eeaff6651f9e70e165113730d5cdf25f"], 0xff0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) sendfile(r1, r3, &(0x7f0000000080), 0x100000000) 18:46:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x600, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 18:46:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xe}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x252]}, 0x48) 18:46:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x10}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 18:46:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 18:46:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x700, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x17000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x300}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3144.310568][T10482] IPVS: ftp: loaded support on port[0] = 21 [ 3144.596281][T10504] IPVS: ftp: loaded support on port[0] = 21 [ 3146.474556][ T27] audit: type=1804 audit(1565117171.415:3834): pid=10479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1359/memory.events" dev="sda1" ino=16755 res=1 [ 3146.502039][ T27] audit: type=1800 audit(1565117171.415:3835): pid=10479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16755 res=0 [ 3146.574071][ T27] audit: type=1804 audit(1565117171.515:3836): pid=10501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1789/memory.events" dev="sda1" ino=16929 res=1 [ 3146.600062][ T27] audit: type=1800 audit(1565117171.515:3837): pid=10501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16929 res=0 [ 3147.919971][ T27] audit: type=1804 audit(1565117172.865:3838): pid=10506 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1359/memory.events" dev="sda1" ino=16755 res=1 [ 3147.945907][ T27] audit: type=1804 audit(1565117172.865:3839): pid=10508 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1359/memory.events" dev="sda1" ino=16755 res=1 18:46:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x19000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x17000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 18:46:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 18:46:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xa00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x900, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 18:46:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 18:46:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xa00, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xe00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3149.905467][T10541] IPVS: ftp: loaded support on port[0] = 21 [ 3149.913416][T10540] IPVS: ftp: loaded support on port[0] = 21 18:46:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 18:46:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) [ 3152.005836][ T27] audit: type=1804 audit(1565117176.945:3840): pid=10532 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1360/memory.events" dev="sda1" ino=17107 res=1 [ 3152.063357][ T27] audit: type=1800 audit(1565117176.945:3841): pid=10532 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17107 res=0 [ 3152.092422][ T27] audit: type=1804 audit(1565117176.975:3842): pid=10537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1790/memory.events" dev="sda1" ino=16486 res=1 [ 3152.126067][ T27] audit: type=1800 audit(1565117176.975:3843): pid=10537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16486 res=0 [ 3154.713721][ T27] audit: type=1804 audit(1565117179.655:3844): pid=10558 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1360/memory.events" dev="sda1" ino=17107 res=1 [ 3154.739389][ T27] audit: type=1804 audit(1565117179.655:3845): pid=10559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1360/memory.events" dev="sda1" ino=17107 res=1 18:46:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1a000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xa00, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xe00, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x2000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 18:46:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 18:46:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x4000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x48) 18:46:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x2000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3155.037544][T10577] IPVS: ftp: loaded support on port[0] = 21 18:46:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) 18:46:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x18000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xff00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3155.644691][T10604] IPVS: ftp: loaded support on port[0] = 21 [ 3157.373882][ T27] audit: type=1804 audit(1565117182.315:3846): pid=10603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1792/memory.events" dev="sda1" ino=16484 res=1 [ 3157.400990][ T27] audit: type=1800 audit(1565117182.315:3847): pid=10603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16484 res=0 [ 3157.498216][ T27] audit: type=1804 audit(1565117182.435:3848): pid=10570 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1361/memory.events" dev="sda1" ino=17089 res=1 [ 3157.524819][ T27] audit: type=1800 audit(1565117182.435:3849): pid=10570 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17089 res=0 [ 3160.179627][ T27] audit: type=1804 audit(1565117185.125:3850): pid=10607 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1361/memory.events" dev="sda1" ino=17089 res=1 [ 3160.264548][ T27] audit: type=1804 audit(1565117185.125:3851): pid=10609 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1361/memory.events" dev="sda1" ino=17089 res=1 18:46:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1b000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 18:46:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x48) 18:46:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x2c01, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x200000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x31004) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcaa0900]}, 0x48) 18:46:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x48) 18:46:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x3200, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3160.790568][T10637] IPVS: ftp: loaded support on port[0] = 21 [ 3160.790604][T10638] IPVS: ftp: loaded support on port[0] = 21 18:46:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x48) 18:46:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x2000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3162.938136][ T27] audit: type=1804 audit(1565117187.875:3852): pid=10633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1793/memory.events" dev="sda1" ino=17161 res=1 [ 3163.004238][ T27] audit: type=1800 audit(1565117187.875:3853): pid=10633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17161 res=0 [ 3163.032553][ T27] audit: type=1804 audit(1565117187.905:3854): pid=10628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1362/memory.events" dev="sda1" ino=17169 res=1 [ 3163.066194][ T27] audit: type=1800 audit(1565117187.905:3855): pid=10628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17169 res=0 [ 3165.608128][ T27] audit: type=1804 audit(1565117190.545:3856): pid=10643 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1362/memory.events" dev="sda1" ino=17169 res=1 [ 3165.633331][ T27] audit: type=1804 audit(1565117190.555:3857): pid=10645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1362/memory.events" dev="sda1" ino=17169 res=1 18:46:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1c000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 18:46:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x3f00, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x48) 18:46:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x3000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x31004) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x8000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 18:46:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100]}, 0x48) 18:46:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x4000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3165.939985][T10680] IPVS: ftp: loaded support on port[0] = 21 18:46:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x48) 18:46:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xa000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3166.151223][T10691] IPVS: ftp: loaded support on port[0] = 21 [ 3168.288858][ T27] audit: type=1804 audit(1565117193.235:3858): pid=10685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1794/memory.events" dev="sda1" ino=16993 res=1 [ 3168.328107][ T27] audit: type=1800 audit(1565117193.235:3859): pid=10685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16993 res=0 [ 3168.348731][ T27] audit: type=1804 audit(1565117193.255:3860): pid=10678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1363/memory.events" dev="sda1" ino=16977 res=1 [ 3168.374639][ T27] audit: type=1800 audit(1565117193.255:3861): pid=10678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16977 res=0 [ 3170.993626][ T27] audit: type=1804 audit(1565117195.935:3862): pid=10706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1363/memory.events" dev="sda1" ino=16977 res=1 [ 3171.019864][ T27] audit: type=1804 audit(1565117195.935:3863): pid=10708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1363/memory.events" dev="sda1" ino=16977 res=1 18:46:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1c100300) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:36 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x6000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300]}, 0x48) 18:46:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 18:46:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xe000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x31004) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000]}, 0x48) 18:46:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, 0x48) 18:46:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x10000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:36 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x80fe, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000]}, 0x48) 18:46:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) [ 3171.513023][T10737] IPVS: ftp: loaded support on port[0] = 21 [ 3171.815858][T10752] IPVS: ftp: loaded support on port[0] = 21 [ 3173.681853][ T27] audit: type=1804 audit(1565117198.625:3864): pid=10750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1795/memory.events" dev="sda1" ino=17174 res=1 [ 3173.709241][ T27] audit: type=1800 audit(1565117198.625:3865): pid=10750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17174 res=0 [ 3173.729705][ T27] audit: type=1804 audit(1565117198.625:3866): pid=10733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1364/memory.events" dev="sda1" ino=16913 res=1 [ 3173.755312][ T27] audit: type=1800 audit(1565117198.625:3867): pid=10733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16913 res=0 [ 3176.376670][ T27] audit: type=1804 audit(1565117201.315:3868): pid=10757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1364/memory.events" dev="sda1" ino=16913 res=1 [ 3176.418026][ T27] audit: type=1804 audit(1565117201.315:3869): pid=10759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1364/memory.events" dev="sda1" ino=16913 res=1 18:46:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xb405, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x40000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 18:46:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1d000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 18:46:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1c000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xff000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 18:46:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 18:46:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xb605, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3176.802955][T10775] IPVS: ftp: loaded support on port[0] = 21 18:46:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x1000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202]}, 0x48) 18:46:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 18:46:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xc0fe, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3177.137515][T10794] IPVS: ftp: loaded support on port[0] = 21 18:46:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x20000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3177.926512][T10818] IPVS: ftp: loaded support on port[0] = 21 [ 3179.050175][ T27] audit: type=1804 audit(1565117203.995:3870): pid=10792 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1796/memory.events" dev="sda1" ino=17175 res=1 [ 3179.085158][ T27] audit: type=1800 audit(1565117203.995:3871): pid=10792 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17175 res=0 [ 3180.402972][ T27] audit: type=1804 audit(1565117205.345:3872): pid=10816 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1365/memory.events" dev="sda1" ino=17121 res=1 [ 3180.438917][ T27] audit: type=1800 audit(1565117205.345:3873): pid=10816 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17121 res=0 18:46:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfc00, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52020000]}, 0x48) 18:46:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100]}, 0x48) 18:46:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x100000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1e000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x31000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x200000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61000000]}, 0x48) 18:46:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300]}, 0x48) 18:46:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfe80, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3180.895854][T10837] IPVS: ftp: loaded support on port[0] = 21 18:46:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x300000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3181.030501][T10847] IPVS: ftp: loaded support on port[0] = 21 18:46:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100]}, 0x48) 18:46:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000]}, 0x48) 18:46:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfec0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x800000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300]}, 0x48) [ 3183.222185][ T27] audit: type=1804 audit(1565117208.165:3874): pid=10836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1366/memory.events" dev="sda1" ino=17206 res=1 [ 3183.273893][ T27] audit: type=1800 audit(1565117208.165:3875): pid=10836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17206 res=0 [ 3183.302349][ T27] audit: type=1804 audit(1565117208.175:3876): pid=10842 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1797/memory.events" dev="sda1" ino=17202 res=1 [ 3183.335470][ T27] audit: type=1800 audit(1565117208.175:3877): pid=10842 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17202 res=0 [ 3185.930815][ T27] audit: type=1804 audit(1565117210.875:3878): pid=10837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1366/memory.events" dev="sda1" ino=17206 res=1 18:46:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1f000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71000000]}, 0x48) [ 3186.005548][ T27] audit: type=1804 audit(1565117210.875:3879): pid=10845 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1366/memory.events" dev="sda1" ino=17206 res=1 18:46:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xa00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xff00, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}, 0x48) 18:46:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x31000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 18:46:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x100000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73000000]}, 0x48) 18:46:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xe00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3186.353181][ T27] audit: type=1804 audit(1565117211.295:3880): pid=10903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1798/memory.events" dev="sda1" ino=17220 res=1 [ 3186.363716][T10901] IPVS: ftp: loaded support on port[0] = 21 18:46:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f]}, 0x48) 18:46:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) [ 3186.548171][T10896] IPVS: ftp: loaded support on port[0] = 21 [ 3187.408791][ T27] audit: type=1804 audit(1565117212.355:3881): pid=10898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1367/memory.events" dev="sda1" ino=17222 res=1 [ 3189.154193][ T27] audit: type=1800 audit(1565117214.095:3882): pid=10898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17222 res=0 18:46:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x20000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x31000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:46:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x1000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:46:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x1000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b6c9]}, 0x48) 18:46:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98990a00]}, 0x48) 18:46:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0x4000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:46:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff]}, 0x48) 18:46:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3ce]}, 0x48) 18:46:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x2000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3190.565512][T10945] IPVS: ftp: loaded support on port[0] = 21 [ 3190.632997][T10957] IPVS: ftp: loaded support on port[0] = 21 18:46:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0x48) 18:46:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xff00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3191.453115][ T27] audit: type=1804 audit(1565117216.395:3883): pid=10943 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1799/memory.events" dev="sda1" ino=17217 res=1 [ 3191.479848][ T27] audit: type=1800 audit(1565117216.395:3884): pid=10943 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17217 res=0 [ 3192.882564][ T27] audit: type=1804 audit(1565117217.825:3885): pid=10949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1368/memory.events" dev="sda1" ino=17221 res=1 [ 3192.917139][ T27] audit: type=1800 audit(1565117217.825:3886): pid=10949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17221 res=0 [ 3194.217779][ T27] audit: type=1804 audit(1565117219.155:3887): pid=10976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1368/memory.events" dev="sda1" ino=17221 res=1 [ 3194.250508][ T27] audit: type=1804 audit(1565117219.155:3888): pid=10977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1368/memory.events" dev="sda1" ino=17221 res=1 18:46:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x21000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3194.466676][T10984] IPVS: ftp: loaded support on port[0] = 21 18:47:00 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockname(r0, &(0x7f0000000080)=@pppol2tpv3in6, &(0x7f0000000000)=0x80) 18:47:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf, 0x0, 0x0, 0xffffffff00000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x3000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff]}, 0x48) 18:47:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 18:47:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff]}, 0x48) 18:47:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x2}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202f00]}, 0x48) 18:47:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x4000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:00 executing program 0: 18:47:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) [ 3196.898154][ T27] audit: type=1804 audit(1565117221.835:3889): pid=10983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1369/memory.events" dev="sda1" ino=16593 res=1 [ 3196.924158][ T27] audit: type=1800 audit(1565117221.835:3890): pid=10983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16593 res=0 [ 3198.230110][ T27] audit: type=1804 audit(1565117223.175:3891): pid=10985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1369/memory.events" dev="sda1" ino=16593 res=1 18:47:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x22000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x3}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ee000]}, 0x48) 18:47:03 executing program 0: 18:47:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x5000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f0000]}, 0x48) [ 3198.267658][ T27] audit: type=1804 audit(1565117223.175:3892): pid=10987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1369/memory.events" dev="sda1" ino=16593 res=1 18:47:03 executing program 0: 18:47:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f2000]}, 0x48) 18:47:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x8}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}, 0x48) 18:47:03 executing program 0: 18:47:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x6000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3198.720885][T11049] IPVS: ftp: loaded support on port[0] = 21 [ 3199.578346][ T27] audit: type=1804 audit(1565117224.515:3893): pid=11044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1370/memory.events" dev="sda1" ino=16833 res=1 [ 3199.613105][ T27] audit: type=1800 audit(1565117224.515:3894): pid=11044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16833 res=0 [ 3200.929422][ T27] audit: type=1804 audit(1565117225.875:3895): pid=11066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1370/memory.events" dev="sda1" ino=16833 res=1 18:47:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x23000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xa}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3200.955970][ T27] audit: type=1804 audit(1565117225.885:3896): pid=11067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1370/memory.events" dev="sda1" ino=16833 res=1 18:47:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) 18:47:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000]}, 0x48) 18:47:05 executing program 0: 18:47:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x7000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9c]}, 0x48) 18:47:06 executing program 0: 18:47:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000]}, 0x48) 18:47:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xe}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x8000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000540)=""/186, 0x2a1}, {0x0}, {0x0}, {0x0, 0xa1}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/228, 0xe4}], 0x1}, 0x2) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0x0) shutdown(r0, 0x0) shutdown(r0, 0x1) recvfrom$inet(r1, 0x0, 0x10000002c, 0x2, 0x0, 0x800e0054e) shutdown(r1, 0x0) [ 3201.461963][T11091] IPVS: ftp: loaded support on port[0] = 21 [ 3202.264119][ T27] audit: type=1804 audit(1565117227.205:3897): pid=11088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1371/memory.events" dev="sda1" ino=17236 res=1 [ 3202.322523][ T27] audit: type=1800 audit(1565117227.235:3898): pid=11088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17236 res=0 [ 3203.608217][ T27] audit: type=1804 audit(1565117228.545:3899): pid=11113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1371/memory.events" dev="sda1" ino=17236 res=1 18:47:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x24000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x10}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f]}, 0x48) 18:47:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}, 0x48) 18:47:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x9000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:08 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='nv\x00', 0x3) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000003c0)="f3c19d21611d9b703c8431", 0x2ca}, {&(0x7f0000000700)="03babc762ca90c50e6e2507acd6898f2a66d158ecf9a6d12d122342ca4d6f97deb82f2059936f2589a4902f01ffdf5cff774c04db277c1613c5ae2dd0ca221ab64697ce9d96bebdbc26dd7bb5945aa7f05", 0x51}], 0x2}, 0x0) [ 3203.634069][ T27] audit: type=1804 audit(1565117228.555:3900): pid=11115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1371/memory.events" dev="sda1" ino=17236 res=1 18:47:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x300}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x48) 18:47:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe02e00]}, 0x48) 18:47:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xa000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3203.999841][T11136] IPVS: ftp: loaded support on port[0] = 21 18:47:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffabfff000]}, 0x48) 18:47:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) [ 3204.945273][ T27] audit: type=1804 audit(1565117229.885:3901): pid=11135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1372/memory.events" dev="sda1" ino=17248 res=1 [ 3204.971188][ T27] audit: type=1800 audit(1565117229.885:3902): pid=11135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17248 res=0 [ 3206.295818][ T27] audit: type=1804 audit(1565117231.235:3903): pid=11163 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1372/memory.events" dev="sda1" ino=17248 res=1 [ 3206.322321][ T27] audit: type=1804 audit(1565117231.245:3904): pid=11165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1372/memory.events" dev="sda1" ino=17248 res=1 18:47:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x25000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xe000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xa00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 18:47:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 18:47:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080), 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f00000001c0), 0x4) 18:47:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x20) 18:47:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) 18:47:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 18:47:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x10000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xe00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) [ 3206.836078][T11196] IPVS: ftp: loaded support on port[0] = 21 [ 3207.631677][ T27] audit: type=1804 audit(1565117232.575:3905): pid=11184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1373/memory.events" dev="sda1" ino=17252 res=1 [ 3207.676538][ T27] audit: type=1800 audit(1565117232.575:3906): pid=11184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17252 res=0 [ 3208.965984][ T27] audit: type=1804 audit(1565117233.905:3907): pid=11211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1373/memory.events" dev="sda1" ino=17252 res=1 [ 3208.991498][ T27] audit: type=1804 audit(1565117233.905:3908): pid=11212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1373/memory.events" dev="sda1" ino=17252 res=1 18:47:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x20000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 18:47:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000001503000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001dd400300000000003406000001ed000071100c00000000006c640000000000007b1300fe000000008500000019000000b7000000000000009500000000000000023bc065b7a379d179fc9e88af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7796001b1470d1259965a7239456d12cc8d46e5512bb7"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 18:47:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x2000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x26000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000]}, 0x48) 18:47:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 18:47:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x4000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x24000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x2c010000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40340000000000]}, 0x48) [ 3209.291044][ T27] audit: type=1804 audit(1565117234.235:3909): pid=11230 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1374/memory.events" dev="sda1" ino=17263 res=1 [ 3209.434923][T11230] IPVS: ftp: loaded support on port[0] = 21 18:47:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xff00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 18:47:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x32000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000]}, 0x48) 18:47:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) [ 3209.795737][T11252] IPVS: ftp: loaded support on port[0] = 21 [ 3210.316774][ T27] audit: type=1804 audit(1565117235.255:3910): pid=11250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1812/memory.events" dev="sda1" ino=17281 res=1 [ 3210.606642][T11274] IPVS: ftp: loaded support on port[0] = 21 [ 3211.667228][ T27] audit: type=1804 audit(1565117236.605:3911): pid=11269 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1374/memory.events" dev="sda1" ino=17263 res=1 [ 3211.701337][ T27] audit: type=1804 audit(1565117236.645:3912): pid=11271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1374/memory.events" dev="sda1" ino=17263 res=1 [ 3211.730635][ T27] audit: type=1804 audit(1565117236.645:3913): pid=11273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1374/memory.events" dev="sda1" ino=17263 res=1 [ 3212.371741][ T27] audit: type=1800 audit(1565117237.315:3914): pid=11250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17281 res=0 18:47:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x27000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}, 0x48) 18:47:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x200000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x3f000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) 18:47:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x23000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 18:47:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffabff030000]}, 0x48) 18:47:18 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x40000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3213.617474][T11293] IPVS: ftp: loaded support on port[0] = 21 [ 3213.720765][T11295] IPVS: ftp: loaded support on port[0] = 21 18:47:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x2000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x48) [ 3215.882462][ T27] audit: type=1804 audit(1565117240.825:3915): pid=11291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1375/memory.events" dev="sda1" ino=17293 res=1 [ 3215.912981][ T27] audit: type=1800 audit(1565117240.825:3916): pid=11291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17293 res=0 [ 3215.934359][ T27] audit: type=1804 audit(1565117240.855:3917): pid=11292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1813/memory.events" dev="sda1" ino=17291 res=1 [ 3215.960966][ T27] audit: type=1800 audit(1565117240.855:3918): pid=11292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17291 res=0 [ 3217.220392][ T27] audit: type=1804 audit(1565117242.165:3919): pid=11322 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1375/memory.events" dev="sda1" ino=17293 res=1 [ 3217.246649][ T27] audit: type=1804 audit(1565117242.165:3920): pid=11324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1375/memory.events" dev="sda1" ino=17293 res=1 18:47:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x28000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x60000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 18:47:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x3000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x48) 18:47:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x48) 18:47:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 18:47:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x8000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x8dffffff, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) [ 3219.037185][T11346] IPVS: ftp: loaded support on port[0] = 21 18:47:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x22000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x48) [ 3219.675560][T11372] IPVS: ftp: loaded support on port[0] = 21 [ 3221.418007][ T27] audit: type=1804 audit(1565117246.355:3921): pid=11371 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1815/memory.events" dev="sda1" ino=16788 res=1 [ 3221.470465][ T27] audit: type=1804 audit(1565117246.365:3922): pid=11340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1376/memory.events" dev="sda1" ino=17138 res=1 [ 3221.505724][ T27] audit: type=1800 audit(1565117246.365:3923): pid=11340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17138 res=0 [ 3221.533457][ T27] audit: type=1800 audit(1565117246.405:3924): pid=11371 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16788 res=0 [ 3224.122162][ T27] audit: type=1804 audit(1565117249.065:3925): pid=11374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1376/memory.events" dev="sda1" ino=17138 res=1 [ 3224.147879][ T27] audit: type=1804 audit(1565117249.065:3926): pid=11376 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1376/memory.events" dev="sda1" ino=17138 res=1 18:47:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x29000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xa000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xb4050000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 18:47:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21000000]}, 0x48) 18:47:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 18:47:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000]}, 0x48) 18:47:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 18:47:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1d000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xe000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xb6050000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3224.506587][T11397] IPVS: ftp: loaded support on port[0] = 21 18:47:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) [ 3224.897507][T11420] IPVS: ftp: loaded support on port[0] = 21 [ 3225.493998][ T27] audit: type=1804 audit(1565117250.435:3927): pid=11395 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1377/memory.events" dev="sda1" ino=16721 res=1 [ 3225.528614][ T27] audit: type=1800 audit(1565117250.435:3928): pid=11395 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16721 res=0 [ 3228.165655][ T27] audit: type=1804 audit(1565117253.105:3929): pid=11397 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1377/memory.events" dev="sda1" ino=16721 res=1 [ 3228.191376][ T27] audit: type=1804 audit(1565117253.105:3930): pid=11400 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1377/memory.events" dev="sda1" ino=16721 res=1 [ 3228.217066][ T27] audit: type=1804 audit(1565117253.145:3931): pid=11418 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1817/memory.events" dev="sda1" ino=16737 res=1 [ 3228.243145][ T27] audit: type=1800 audit(1565117253.145:3932): pid=11418 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16737 res=0 18:47:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2a000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000]}, 0x48) 18:47:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x10000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xe4ffffff, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 18:47:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1517f) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 18:47:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 18:47:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x40000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xf5ffffff, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) 18:47:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) [ 3230.146575][T11460] IPVS: ftp: loaded support on port[0] = 21 [ 3230.177457][T11457] IPVS: ftp: loaded support on port[0] = 21 [ 3232.261118][ T27] audit: type=1804 audit(1565117257.205:3933): pid=11453 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1818/memory.events" dev="sda1" ino=16849 res=1 [ 3232.304329][ T27] audit: type=1800 audit(1565117257.205:3934): pid=11453 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16849 res=0 [ 3232.332352][ T27] audit: type=1804 audit(1565117257.205:3935): pid=11455 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1378/memory.events" dev="sda1" ino=16881 res=1 [ 3232.366609][ T27] audit: type=1800 audit(1565117257.205:3936): pid=11455 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16881 res=0 [ 3234.896339][ T27] audit: type=1804 audit(1565117259.835:3937): pid=11476 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1378/memory.events" dev="sda1" ino=16881 res=1 [ 3234.923161][ T27] audit: type=1804 audit(1565117259.845:3938): pid=11477 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1378/memory.events" dev="sda1" ino=16881 res=1 18:47:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2b000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xe4ffffff, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfc000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xff000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 18:47:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 18:47:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x1000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52020000]}, 0x48) 18:47:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcaa090000000000]}, 0x48) 18:47:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x5000000, 0x0, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfe800000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3235.364902][T11502] IPVS: ftp: loaded support on port[0] = 21 18:47:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x20000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3236.328313][ T27] audit: type=1804 audit(1565117261.265:3939): pid=11499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1379/memory.events" dev="sda1" ino=16834 res=1 [ 3236.376029][ T27] audit: type=1800 audit(1565117261.265:3940): pid=11499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16834 res=0 18:47:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x1000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61000000]}, 0x48) 18:47:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x48) 18:47:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfec00000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3237.675772][ T27] audit: type=1804 audit(1565117262.615:3941): pid=11526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1379/memory.events" dev="sda1" ino=16834 res=1 [ 3237.700898][ T27] audit: type=1804 audit(1565117262.615:3942): pid=11527 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1379/memory.events" dev="sda1" ino=16834 res=1 18:47:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2c000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x100000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) 18:47:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000]}, 0x48) 18:47:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x200000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfc000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xff000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x300000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71000000]}, 0x48) [ 3238.175380][T11550] IPVS: ftp: loaded support on port[0] = 21 18:47:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 18:47:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7400) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x800000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3238.769385][T11583] IPVS: ftp: loaded support on port[0] = 21 [ 3240.339546][ T27] audit: type=1804 audit(1565117265.285:3943): pid=11582 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1823/memory.events" dev="sda1" ino=16576 res=1 [ 3240.383965][ T27] audit: type=1800 audit(1565117265.315:3944): pid=11582 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16576 res=0 [ 3240.404765][ T27] audit: type=1804 audit(1565117265.315:3945): pid=11545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1380/memory.events" dev="sda1" ino=17009 res=1 [ 3240.432435][ T27] audit: type=1800 audit(1565117265.315:3946): pid=11545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17009 res=0 [ 3243.032402][ T27] audit: type=1804 audit(1565117267.975:3947): pid=11585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1380/memory.events" dev="sda1" ino=17009 res=1 [ 3243.059291][ T27] audit: type=1804 audit(1565117267.975:3948): pid=11587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1380/memory.events" dev="sda1" ino=17009 res=1 18:47:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x48) 18:47:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xffffff8d, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73000000]}, 0x48) 18:47:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xa00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2d000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7400) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) 18:47:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) 18:47:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xe00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xffffffe4, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3243.475209][T11617] IPVS: ftp: loaded support on port[0] = 21 [ 3243.503540][T11610] IPVS: ftp: loaded support on port[0] = 21 18:47:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff]}, 0x48) 18:47:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x1000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300000000000000]}, 0x48) 18:47:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff]}, 0x48) 18:47:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x4000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfffffff5, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3245.794606][ T27] audit: type=1804 audit(1565117270.735:3950): pid=11611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1381/memory.events" dev="sda1" ino=16524 res=1 [ 3245.827862][ T27] audit: type=1804 audit(1565117270.735:3949): pid=11607 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1824/memory.events" dev="sda1" ino=16590 res=1 [ 3245.854752][ T27] audit: type=1800 audit(1565117270.735:3951): pid=11611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16524 res=0 [ 3245.877107][ T27] audit: type=1800 audit(1565117270.735:3952): pid=11607 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16590 res=0 [ 3248.486598][ T27] audit: type=1804 audit(1565117273.425:3953): pid=11622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1381/memory.events" dev="sda1" ino=16524 res=1 18:47:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2e000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3248.548126][ T27] audit: type=1804 audit(1565117273.425:3954): pid=11651 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1381/memory.events" dev="sda1" ino=16524 res=1 18:47:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7400) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, 0x48) 18:47:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xff00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9b60800]}, 0x48) 18:47:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x8000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcec30800]}, 0x48) 18:47:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 18:47:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0xffffffff00000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x1000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x2}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) [ 3249.013888][T11679] IPVS: ftp: loaded support on port[0] = 21 [ 3249.138394][T11687] IPVS: ftp: loaded support on port[0] = 21 [ 3251.168120][ T27] audit: type=1804 audit(1565117276.105:3956): pid=11685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1825/memory.events" dev="sda1" ino=17153 res=1 [ 3251.193912][ T27] audit: type=1804 audit(1565117276.105:3955): pid=11674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1382/memory.events" dev="sda1" ino=17121 res=1 [ 3251.220761][ T27] audit: type=1800 audit(1565117276.105:3957): pid=11674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17121 res=0 [ 3251.220790][ T27] audit: type=1800 audit(1565117276.105:3958): pid=11685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17153 res=0 [ 3252.501818][ T27] audit: type=1804 audit(1565117277.445:3959): pid=11700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1382/memory.events" dev="sda1" ino=17121 res=1 [ 3252.527209][ T27] audit: type=1804 audit(1565117277.475:3960): pid=11702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1382/memory.events" dev="sda1" ino=17121 res=1 18:47:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x10000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff]}, 0x48) 18:47:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 18:47:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x3}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9b60800]}, 0x48) 18:47:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2f000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:47:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x100000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x8}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202000000000000]}, 0x48) 18:47:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 18:47:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2e000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3254.399588][T11729] IPVS: ftp: loaded support on port[0] = 21 18:47:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xa}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:47:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f0000]}, 0x48) 18:47:59 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x200000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:47:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000]}, 0x48) 18:47:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xe}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3254.721643][T11750] IPVS: ftp: loaded support on port[0] = 21 18:47:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}, 0x48) [ 3256.719748][ T27] audit: type=1804 audit(1565117281.665:3961): pid=11724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1383/memory.events" dev="sda1" ino=16632 res=1 [ 3256.764665][ T27] audit: type=1800 audit(1565117281.665:3962): pid=11724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16632 res=0 [ 3256.793155][ T27] audit: type=1804 audit(1565117281.665:3963): pid=11746 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1827/memory.events" dev="sda1" ino=16633 res=1 [ 3256.826599][ T27] audit: type=1800 audit(1565117281.665:3964): pid=11746 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16633 res=0 [ 3259.423868][ T27] audit: type=1804 audit(1565117284.365:3965): pid=11766 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1383/memory.events" dev="sda1" ino=16632 res=1 [ 3259.456362][ T27] audit: type=1804 audit(1565117284.365:3966): pid=11768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1383/memory.events" dev="sda1" ino=16632 res=1 18:48:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x30000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000]}, 0x48) 18:48:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x300000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x10}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) 18:48:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000540)=""/186, 0x2a1}, {0x0}, {0x0}, {0x0, 0xa1}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) shutdown(r0, 0x1) recvfrom$inet(r1, 0x0, 0x10000002c, 0x0, 0x0, 0x800e0054e) shutdown(r1, 0x0) 18:48:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x300}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9c]}, 0x48) 18:48:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x400000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000]}, 0x48) [ 3259.843200][T11795] IPVS: ftp: loaded support on port[0] = 21 18:48:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xa00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000003c0)=""/99, 0x63}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000040)=""/206, 0xce}], 0x1) shutdown(r0, 0x0) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) shutdown(r1, 0x0) [ 3260.768449][ T27] audit: type=1804 audit(1565117285.715:3967): pid=11789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1384/memory.events" dev="sda1" ino=16665 res=1 [ 3260.814693][ T27] audit: type=1800 audit(1565117285.755:3968): pid=11789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16665 res=0 [ 3262.139276][ T27] audit: type=1804 audit(1565117287.085:3969): pid=11823 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1384/memory.events" dev="sda1" ino=16665 res=1 18:48:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x31000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x500000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f]}, 0x48) 18:48:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000]}, 0x48) 18:48:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xe00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:07 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) poll(&(0x7f00000000c0), 0x0, 0x0) poll(&(0x7f0000000040)=[{r0, 0x4}], 0x1, 0x4d) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffffdd, 0x0, 0x0, 0x800e0086e) poll(&(0x7f0000000000)=[{}], 0x1, 0x5d) shutdown(r1, 0x0) [ 3262.174909][ T27] audit: type=1804 audit(1565117287.085:3970): pid=11824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1384/memory.events" dev="sda1" ino=16665 res=1 18:48:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x2000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x48) 18:48:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x600000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) [ 3262.463627][T11846] IPVS: ftp: loaded support on port[0] = 21 18:48:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x4000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffabfff000]}, 0x48) [ 3263.486550][ T27] audit: type=1804 audit(1565117288.425:3971): pid=11843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1385/memory.events" dev="sda1" ino=16785 res=1 [ 3263.512646][ T27] audit: type=1800 audit(1565117288.425:3972): pid=11843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16785 res=0 [ 3264.822208][ T27] audit: type=1804 audit(1565117289.765:3973): pid=11873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1385/memory.events" dev="sda1" ino=16785 res=1 [ 3264.849688][ T27] audit: type=1804 audit(1565117289.765:3974): pid=11874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1385/memory.events" dev="sda1" ino=16785 res=1 18:48:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x32000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98990a0000000000]}, 0x48) 18:48:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffc85, 0x0, 0x0, 0xffffffffffffff09) recvfrom$inet(r0, 0x0, 0xe4302094, 0x2, 0x0, 0x800e00706) shutdown(r0, 0x0) 18:48:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xff00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x700000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 18:48:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000000c0)=""/252, 0xfc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x40002) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2d79, 0x0, 0x0, 0x800e00670) shutdown(r0, 0x0) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/146, 0x92}], 0x1}, 0x0) shutdown(r1, 0x0) 18:48:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000]}, 0x48) 18:48:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x800000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x200000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) [ 3265.304903][T11895] IPVS: ftp: loaded support on port[0] = 21 18:48:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3266.207748][ T27] audit: type=1804 audit(1565117291.145:3975): pid=11892 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1386/memory.events" dev="sda1" ino=16977 res=1 [ 3266.234205][ T27] audit: type=1800 audit(1565117291.145:3976): pid=11892 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16977 res=0 [ 3267.554281][ T27] audit: type=1804 audit(1565117292.495:3977): pid=11921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1386/memory.events" dev="sda1" ino=16977 res=1 [ 3267.622797][ T27] audit: type=1804 audit(1565117292.525:3978): pid=11922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1386/memory.events" dev="sda1" ino=16977 res=1 18:48:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x33000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x900000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 18:48:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000]}, 0x48) 18:48:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000540)=""/186, 0x2a1}, {0x0}, {0x0}, {0x0, 0xa1}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/228, 0xe4}], 0x1}, 0x2) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0x0) shutdown(r0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r1, 0x0, 0x10000002c, 0x2, 0x0, 0x800e0054e) shutdown(r1, 0x0) 18:48:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x2000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x3000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202f0000000000]}, 0x48) 18:48:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x48) 18:48:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xa00000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x8000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3268.106137][T11951] IPVS: ftp: loaded support on port[0] = 21 18:48:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000]}, 0x48) [ 3268.896061][ T27] audit: type=1804 audit(1565117293.835:3979): pid=11945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1387/memory.events" dev="sda1" ino=17105 res=1 [ 3270.821325][ T27] audit: type=1800 audit(1565117295.755:3980): pid=11945 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17105 res=0 18:48:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x34000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 18:48:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xffffff8d, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xa000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:15 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xe00000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000]}, 0x48) 18:48:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x33000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f000000000000]}, 0x48) 18:48:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xe000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}, 0x48) 18:48:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x1000000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x10000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3271.427506][T11999] IPVS: ftp: loaded support on port[0] = 21 [ 3271.609500][T12009] IPVS: ftp: loaded support on port[0] = 21 [ 3273.518149][ T27] audit: type=1804 audit(1565117298.455:3981): pid=11995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1388/memory.events" dev="sda1" ino=16626 res=1 [ 3273.561834][ T27] audit: type=1800 audit(1565117298.455:3982): pid=11995 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16626 res=0 [ 3273.583211][ T27] audit: type=1804 audit(1565117298.485:3983): pid=12007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1835/memory.events" dev="sda1" ino=16656 res=1 [ 3273.610897][ T27] audit: type=1800 audit(1565117298.485:3984): pid=12007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16656 res=0 [ 3275.973344][ T27] audit: type=1804 audit(1565117300.915:3985): pid=12017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1388/memory.events" dev="sda1" ino=16626 res=1 [ 3275.999827][ T27] audit: type=1804 audit(1565117300.915:3986): pid=12018 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1388/memory.events" dev="sda1" ino=16626 res=1 18:48:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x35000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 18:48:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe02e0000000000]}, 0x48) 18:48:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x2000000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x40000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x4c00) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xff000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 18:48:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffabff030000]}, 0x48) 18:48:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x2c01000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x1000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3276.735381][T12043] IPVS: ftp: loaded support on port[0] = 21 18:48:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) [ 3276.950338][T12052] IPVS: ftp: loaded support on port[0] = 21 [ 3277.637374][ T27] audit: type=1804 audit(1565117302.575:3987): pid=12041 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1389/memory.events" dev="sda1" ino=16626 res=1 [ 3278.979247][ T27] audit: type=1804 audit(1565117303.925:3988): pid=12048 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1836/memory.events" dev="sda1" ino=16571 res=1 [ 3279.005697][ T27] audit: type=1800 audit(1565117303.925:3989): pid=12048 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16571 res=0 [ 3279.488548][ T27] audit: type=1800 audit(1565117304.435:3990): pid=12041 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16626 res=0 18:48:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x36000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x3200000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 18:48:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x20000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 18:48:26 executing program 0: 18:48:26 executing program 0: 18:48:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x100000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 18:48:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 18:48:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x3f00000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:27 executing program 0: [ 3282.219844][T12085] IPVS: ftp: loaded support on port[0] = 21 [ 3282.672774][ T27] audit: type=1804 audit(1565117307.615:3991): pid=12085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1390/memory.events" dev="sda1" ino=16556 res=1 18:48:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x37000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 18:48:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x200000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x4000000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 18:48:29 executing program 0: 18:48:29 executing program 0: 18:48:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x300000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 18:48:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 18:48:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x6000000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x800000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3285.000749][T12131] IPVS: ftp: loaded support on port[0] = 21 [ 3285.748863][ T27] audit: type=1804 audit(1565117310.695:3992): pid=12123 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1391/memory.events" dev="sda1" ino=16577 res=1 [ 3285.775282][ T27] audit: type=1800 audit(1565117310.695:3993): pid=12123 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16577 res=0 [ 3287.088163][ T27] audit: type=1804 audit(1565117312.025:3994): pid=12150 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1391/memory.events" dev="sda1" ino=16577 res=1 [ 3287.113554][ T27] audit: type=1804 audit(1565117312.035:3995): pid=12151 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1391/memory.events" dev="sda1" ino=16577 res=1 18:48:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x38000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 18:48:32 executing program 0: 18:48:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x8dffffff00000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 18:48:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xa00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xe00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffabff030000]}, 0x48) 18:48:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 18:48:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 18:48:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xb405000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x1000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3287.745113][T12182] IPVS: ftp: loaded support on port[0] = 21 [ 3288.435834][ T27] audit: type=1804 audit(1565117313.375:3996): pid=12171 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1392/memory.events" dev="sda1" ino=16737 res=1 [ 3288.462138][ T27] audit: type=1800 audit(1565117313.375:3997): pid=12171 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16737 res=0 [ 3289.771245][ T27] audit: type=1804 audit(1565117314.715:3998): pid=12194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1392/memory.events" dev="sda1" ino=16737 res=1 [ 3289.805113][ T27] audit: type=1804 audit(1565117314.745:3999): pid=12195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1392/memory.events" dev="sda1" ino=16737 res=1 18:48:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x39000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 18:48:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x4000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x4800) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xb605000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) 18:48:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 18:48:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x48) 18:48:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xff00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:35 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xe4ffffff00000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x48) [ 3290.354215][T12220] IPVS: ftp: loaded support on port[0] = 21 18:48:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) [ 3290.418978][T12221] IPVS: ftp: loaded support on port[0] = 21 [ 3292.644835][ T27] audit: type=1804 audit(1565117317.585:4000): pid=12218 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1844/memory.events" dev="sda1" ino=16801 res=1 [ 3292.676625][ T27] audit: type=1804 audit(1565117317.585:4001): pid=12216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1393/memory.events" dev="sda1" ino=16865 res=1 [ 3292.703291][ T27] audit: type=1800 audit(1565117317.585:4002): pid=12216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16865 res=0 [ 3292.723970][ T27] audit: type=1800 audit(1565117317.615:4003): pid=12218 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16801 res=0 [ 3294.022245][ T27] audit: type=1804 audit(1565117318.965:4004): pid=12225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1393/memory.events" dev="sda1" ino=16865 res=1 [ 3294.047868][ T27] audit: type=1804 audit(1565117318.965:4005): pid=12220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1393/memory.events" dev="sda1" ino=16865 res=1 18:48:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3a000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0xffffffff00000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xf5ffffff00000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x38000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) 18:48:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 18:48:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x2}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfc00000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 18:48:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x48) [ 3295.930062][T12263] IPVS: ftp: loaded support on port[0] = 21 18:48:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23]}, 0x48) 18:48:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x3}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3296.316438][T12279] IPVS: ftp: loaded support on port[0] = 21 [ 3298.029148][ T27] audit: type=1804 audit(1565117322.965:4006): pid=12260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1394/memory.events" dev="sda1" ino=16865 res=1 [ 3298.104889][ T27] audit: type=1800 audit(1565117322.965:4007): pid=12260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16865 res=0 [ 3298.133482][ T27] audit: type=1804 audit(1565117322.995:4008): pid=12276 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1845/memory.events" dev="sda1" ino=16515 res=1 [ 3298.166960][ T27] audit: type=1800 audit(1565117322.995:4009): pid=12276 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16515 res=0 [ 3300.738317][ T27] audit: type=1804 audit(1565117325.685:4010): pid=12292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1394/memory.events" dev="sda1" ino=16865 res=1 18:48:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3b000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x48) 18:48:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfe80000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) [ 3300.798226][ T27] audit: type=1804 audit(1565117325.685:4011): pid=12294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1394/memory.events" dev="sda1" ino=16865 res=1 18:48:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000003c0)="f3c19d21611d9b703c8431", 0x2ca}, {&(0x7f0000000700)="03babc762ca90c50e6e2507acd6898f2a66d158ecf9a6d12d122342ca4d6f97deb82f2059936f2589a4902f01ffdf5cff774c04db277c1613c5ae2dd0ca221ab64697ce9d96bebdbc26dd7bb5945aa7f05", 0x51}], 0x2}, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1}, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0xffffff4a) 18:48:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x8}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, 0x48) 18:48:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xfec0000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100000000000000]}, 0x48) 18:48:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 18:48:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xa}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3301.273067][T12319] IPVS: ftp: loaded support on port[0] = 21 18:48:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xff00000000000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}, 0x48) [ 3302.109488][ T27] audit: type=1804 audit(1565117327.055:4012): pid=12314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1395/memory.events" dev="sda1" ino=16945 res=1 [ 3303.988715][ T27] audit: type=1800 audit(1565117328.925:4013): pid=12314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16945 res=0 18:48:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300000000000000]}, 0x48) 18:48:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xe}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63]}, 0x48) 18:48:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0xffffffff00000000, @local, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:49 executing program 0: 18:48:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3c000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:49 executing program 0: 18:48:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x10}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, 0x48) 18:48:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x10}, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71]}, 0x48) 18:48:49 executing program 0: [ 3304.611486][T12370] IPVS: ftp: loaded support on port[0] = 21 18:48:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x300}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:49 executing program 0: 18:48:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 18:48:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73]}, 0x48) 18:48:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xa00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3305.505174][ T27] audit: type=1804 audit(1565117330.445:4014): pid=12366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1396/memory.events" dev="sda1" ino=16881 res=1 [ 3307.327834][ T27] audit: type=1800 audit(1565117332.265:4015): pid=12366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16881 res=0 18:48:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3f000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 18:48:52 executing program 0: 18:48:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x252]}, 0x48) 18:48:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xe00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0xafa4}, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:52 executing program 0: 18:48:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 18:48:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x2000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 18:48:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000280)=0xff, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 3307.999961][T12428] IPVS: ftp: loaded support on port[0] = 21 [ 3308.680600][ T27] audit: type=1804 audit(1565117333.625:4016): pid=12425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1397/memory.events" dev="sda1" ino=16776 res=1 [ 3308.707351][ T27] audit: type=1800 audit(1565117333.625:4017): pid=12425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16776 res=0 [ 3310.021565][ T27] audit: type=1804 audit(1565117334.965:4018): pid=12440 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1397/memory.events" dev="sda1" ino=16776 res=1 [ 3310.046975][ T27] audit: type=1804 audit(1565117334.965:4019): pid=12441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1397/memory.events" dev="sda1" ino=16776 res=1 18:48:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x40000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x4000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 18:48:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202000000000000]}, 0x48) 18:48:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x3]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x7a, &(0x7f0000000080), &(0x7f0000000140)=0x18) 18:48:55 executing program 0: syz_emit_ethernet(0x66, &(0x7f000010ef70)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x0, 0x0, @empty, @mcast2}}}}}}}, 0x0) 18:48:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xff00}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 18:48:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000]}, 0x48) 18:48:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x4]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:55 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000000), 0x5a9, 0x0, 0x0) [ 3310.518501][T12465] IPVS: ftp: loaded support on port[0] = 21 [ 3311.406449][ T27] audit: type=1804 audit(1565117336.345:4020): pid=12462 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1398/memory.events" dev="sda1" ino=17324 res=1 [ 3311.432692][ T27] audit: type=1800 audit(1565117336.345:4021): pid=12462 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17324 res=0 [ 3312.736481][ T27] audit: type=1804 audit(1565117337.675:4022): pid=12489 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1398/memory.events" dev="sda1" ino=17324 res=1 [ 3312.763217][ T27] audit: type=1804 audit(1565117337.715:4023): pid=12490 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1398/memory.events" dev="sda1" ino=17324 res=1 18:48:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 18:48:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x200000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000]}, 0x48) 18:48:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x5]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x42000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:57 executing program 0: r0 = socket$inet(0x2, 0x2800080001, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000001880)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000040)="fd", 0x1}], 0x1, &(0x7f0000001580)=[@init={0x18}, @prinfo={0x18}], 0x30}], 0x1, 0x40) 18:48:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000]}, 0x48) 18:48:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x40000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:48:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x6]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:48:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 18:48:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x2000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3313.225156][T12519] IPVS: ftp: loaded support on port[0] = 21 18:48:58 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000]}, 0x48) 18:48:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x3000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:48:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x48) 18:48:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x7]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3313.549106][T12530] IPVS: ftp: loaded support on port[0] = 21 [ 3315.428239][ T27] audit: type=1804 audit(1565117340.365:4024): pid=12514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1399/memory.events" dev="sda1" ino=16811 res=1 [ 3315.494323][ T27] audit: type=1800 audit(1565117340.365:4025): pid=12514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16811 res=0 [ 3315.522905][ T27] audit: type=1804 audit(1565117340.405:4026): pid=12529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1858/memory.events" dev="sda1" ino=16826 res=1 [ 3315.558302][ T27] audit: type=1800 audit(1565117340.405:4027): pid=12529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16826 res=0 [ 3318.112921][ T27] audit: type=1804 audit(1565117343.055:4028): pid=12549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1399/memory.events" dev="sda1" ino=16811 res=1 [ 3318.148206][ T27] audit: type=1804 audit(1565117343.055:4029): pid=12551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1399/memory.events" dev="sda1" ino=16811 res=1 18:49:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x45000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 18:49:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x8000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x48) 18:49:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x4]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x8]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xa000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000]}, 0x48) 18:49:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x48) 18:49:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xe000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000]}, 0x48) 18:49:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) [ 3318.614929][T12581] IPVS: ftp: loaded support on port[0] = 21 [ 3319.509926][ T27] audit: type=1804 audit(1565117344.455:4030): pid=12567 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1400/memory.events" dev="sda1" ino=16543 res=1 [ 3321.314564][ T27] audit: type=1800 audit(1565117346.255:4031): pid=12567 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16543 res=0 18:49:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x46000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x9]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9b6080000000000]}, 0x48) 18:49:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300]}, 0x48) 18:49:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x10000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcec3080000000000]}, 0x48) 18:49:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x40000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, 0x48) 18:49:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xa]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x45000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3321.816784][T12615] IPVS: ftp: loaded support on port[0] = 21 18:49:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xff000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3322.220029][T12638] IPVS: ftp: loaded support on port[0] = 21 [ 3324.005658][ T27] audit: type=1804 audit(1565117348.945:4032): pid=12613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1401/memory.events" dev="sda1" ino=16769 res=1 [ 3324.052982][ T27] audit: type=1804 audit(1565117348.945:4033): pid=12636 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1861/memory.events" dev="sda1" ino=16785 res=1 [ 3324.086772][ T27] audit: type=1800 audit(1565117348.945:4034): pid=12613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16769 res=0 [ 3324.115332][ T27] audit: type=1800 audit(1565117348.945:4035): pid=12636 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16785 res=0 [ 3326.325699][ T27] audit: type=1804 audit(1565117351.275:4036): pid=12615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1401/memory.events" dev="sda1" ino=16769 res=1 [ 3326.351623][ T27] audit: type=1804 audit(1565117351.275:4037): pid=12620 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1401/memory.events" dev="sda1" ino=16769 res=1 18:49:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x48000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xe]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x48) 18:49:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 18:49:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x1000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xa]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 18:49:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 18:49:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x20000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3327.230122][T12663] IPVS: ftp: loaded support on port[0] = 21 18:49:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x100000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:12 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x10]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f000000000000]}, 0x48) [ 3328.176905][ T27] audit: type=1804 audit(1565117353.115:4038): pid=12661 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1402/memory.events" dev="sda1" ino=16836 res=1 [ 3328.204822][ T27] audit: type=1800 audit(1565117353.155:4039): pid=12661 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16836 res=0 [ 3329.520726][ T27] audit: type=1804 audit(1565117354.465:4040): pid=12690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1402/memory.events" dev="sda1" ino=16836 res=1 [ 3329.547738][ T27] audit: type=1804 audit(1565117354.465:4041): pid=12691 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1402/memory.events" dev="sda1" ino=16836 res=1 18:49:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x4c000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3c000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 18:49:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x200000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffc8ffffffffff]}, 0x48) 18:49:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x32]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x300000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 18:49:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202]}, 0x48) 18:49:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x60]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3329.944672][T12710] IPVS: ftp: loaded support on port[0] = 21 [ 3330.004839][T12715] IPVS: ftp: loaded support on port[0] = 21 18:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x800000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffc8ffff]}, 0x48) [ 3332.202495][ T27] audit: type=1804 audit(1565117357.145:4042): pid=12713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1403/memory.events" dev="sda1" ino=16853 res=1 [ 3332.243298][ T27] audit: type=1800 audit(1565117357.145:4043): pid=12713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16853 res=0 [ 3332.264754][ T27] audit: type=1804 audit(1565117357.155:4044): pid=12708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1863/memory.events" dev="sda1" ino=16847 res=1 [ 3332.293391][ T27] audit: type=1800 audit(1565117357.155:4045): pid=12708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16847 res=0 [ 3334.482547][ T27] audit: type=1804 audit(1565117359.425:4046): pid=12723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1403/memory.events" dev="sda1" ino=16853 res=1 [ 3334.508983][ T27] audit: type=1804 audit(1565117359.425:4047): pid=12715 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1403/memory.events" dev="sda1" ino=16853 res=1 18:49:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x68000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x800000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xa00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100]}, 0x48) 18:49:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 18:49:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfc]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3335.125860][T12748] IPVS: ftp: loaded support on port[0] = 21 18:49:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 18:49:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xe00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x32]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300]}, 0x48) 18:49:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x12c]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) [ 3336.338677][ T27] audit: type=1804 audit(1565117361.285:4048): pid=12745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1404/memory.events" dev="sda1" ino=16852 res=1 [ 3336.364547][ T27] audit: type=1800 audit(1565117361.285:4049): pid=12745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16852 res=0 [ 3337.669952][ T27] audit: type=1804 audit(1565117362.615:4050): pid=12787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1404/memory.events" dev="sda1" ino=16852 res=1 [ 3337.720710][ T27] audit: type=1804 audit(1565117362.635:4051): pid=12788 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1404/memory.events" dev="sda1" ino=16852 res=1 18:49:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x6c000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfc]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x1000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100]}, 0x48) 18:49:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 18:49:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x300]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0x4000000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 18:49:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x500]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300]}, 0x48) 18:49:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x10]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3338.174986][T12810] IPVS: ftp: loaded support on port[0] = 21 18:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xff00000000000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3339.025330][ T27] audit: type=1804 audit(1565117363.965:4052): pid=12806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1405/memory.events" dev="sda1" ino=16877 res=1 [ 3339.053424][ T27] audit: type=1800 audit(1565117364.005:4053): pid=12806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16877 res=0 [ 3340.380323][ T27] audit: type=1804 audit(1565117365.325:4054): pid=12832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1405/memory.events" dev="sda1" ino=16877 res=1 [ 3340.405767][ T27] audit: type=1804 audit(1565117365.325:4055): pid=12833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1405/memory.events" dev="sda1" ino=16877 res=1 18:49:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x74000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x5b4]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 18:49:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}, 0x48) 18:49:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}, [], {0x95, 0x0, 0x0, 0xffffffff00000000}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x3c000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaOler\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 18:49:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 18:49:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaQler\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3340.816561][T12860] IPVS: ftp: loaded support on port[0] = 21 [ 3340.829352][T12859] IPVS: ftp: loaded support on port[0] = 21 18:49:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x5b6]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f]}, 0x48) [ 3342.370199][ T27] audit: type=1804 audit(1565117367.315:4056): pid=12852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1406/memory.events" dev="sda1" ino=16945 res=1 [ 3342.396036][ T27] audit: type=1800 audit(1565117367.315:4057): pid=12852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16945 res=0 [ 3343.080517][ T27] audit: type=1804 audit(1565117368.025:4058): pid=12851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1868/memory.events" dev="sda1" ino=16908 res=1 [ 3343.106801][ T27] audit: type=1800 audit(1565117368.025:4059): pid=12851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16908 res=0 [ 3345.810726][ T27] audit: type=1804 audit(1565117370.755:4060): pid=12879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1406/memory.events" dev="sda1" ino=16945 res=1 [ 3345.836362][ T27] audit: type=1804 audit(1565117370.755:4061): pid=12881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1406/memory.events" dev="sda1" ino=16945 res=1 18:49:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzka_ler\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 18:49:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9aa0c]}, 0x48) 18:49:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x600]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x5b4]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7a000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9998]}, 0x48) 18:49:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x5b4]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x700]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzka`ler\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x48) 18:49:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaaler\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3346.403057][T12910] IPVS: ftp: loaded support on port[0] = 21 18:49:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0x48) 18:49:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x900]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x600]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) 18:49:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkabler\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3347.182989][ T27] audit: type=1804 audit(1565117372.125:4062): pid=12906 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1407/memory.events" dev="sda1" ino=16911 res=1 [ 3349.077032][ T27] audit: type=1800 audit(1565117374.015:4063): pid=12906 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16911 res=0 18:49:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7f510100) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xa00]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 18:49:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 18:49:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkacler\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x6c000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x48) 18:49:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkakler\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x344000]}, 0x48) 18:49:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xe00]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}, 0x48) 18:49:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkamler\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3349.642717][T12970] IPVS: ftp: loaded support on port[0] = 21 [ 3349.676033][T12978] IPVS: ftp: loaded support on port[0] = 21 [ 3351.825888][ T27] audit: type=1804 audit(1565117376.765:4065): pid=12965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1872/memory.events" dev="sda1" ino=17121 res=1 [ 3351.853219][ T27] audit: type=1804 audit(1565117376.765:4064): pid=12976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1408/memory.events" dev="sda1" ino=16561 res=1 [ 3351.879096][ T27] audit: type=1800 audit(1565117376.765:4066): pid=12965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17121 res=0 [ 3351.899952][ T27] audit: type=1800 audit(1565117376.765:4067): pid=12976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16561 res=0 [ 3354.090417][ T27] audit: type=1804 audit(1565117379.035:4068): pid=12990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1408/memory.events" dev="sda1" ino=16561 res=1 18:49:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xf6ffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3354.116589][ T27] audit: type=1804 audit(1565117379.045:4069): pid=12992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1408/memory.events" dev="sda1" ino=16561 res=1 18:49:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000]}, 0x48) 18:49:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23]}, 0x48) 18:49:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkalOer\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3354.452354][T13013] IPVS: ftp: loaded support on port[0] = 21 18:49:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7a000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, 0x48) 18:49:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2c01]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkalQer\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403400]}, 0x48) 18:49:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 18:49:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkal_er\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3355.142030][T13037] IPVS: ftp: loaded support on port[0] = 21 [ 3357.233281][ T27] audit: type=1804 audit(1565117382.175:4070): pid=13009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1409/memory.events" dev="sda1" ino=16529 res=1 [ 3357.264861][ T27] audit: type=1804 audit(1565117382.175:4071): pid=13035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1873/memory.events" dev="sda1" ino=16545 res=1 [ 3357.298682][ T27] audit: type=1800 audit(1565117382.175:4072): pid=13009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16529 res=0 [ 3357.326910][ T27] audit: type=1800 audit(1565117382.175:4073): pid=13035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16545 res=0 [ 3359.911542][ T27] audit: type=1804 audit(1565117384.855:4074): pid=13014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1409/memory.events" dev="sda1" ino=16529 res=1 [ 3359.947759][ T27] audit: type=1804 audit(1565117384.885:4075): pid=13036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1409/memory.events" dev="sda1" ino=16529 res=1 18:49:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xfbffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x3200]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000]}, 0x48) 18:49:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkal`er\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}, 0x48) 18:49:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7a000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63]}, 0x48) 18:49:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkalaer\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}, 0x48) 18:49:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x3f00]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3360.407950][T13065] IPVS: ftp: loaded support on port[0] = 21 18:49:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71]}, 0x48) [ 3360.550633][T13072] IPVS: ftp: loaded support on port[0] = 21 18:49:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkalber\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3362.723472][ T27] audit: type=1804 audit(1565117387.665:4076): pid=13062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1874/memory.events" dev="sda1" ino=16895 res=1 [ 3362.764791][ T27] audit: type=1800 audit(1565117387.665:4077): pid=13062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16895 res=0 [ 3362.793653][ T27] audit: type=1804 audit(1565117387.665:4078): pid=13068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1410/memory.events" dev="sda1" ino=16927 res=1 [ 3362.829563][ T27] audit: type=1800 audit(1565117387.665:4079): pid=13068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16927 res=0 [ 3365.420109][ T27] audit: type=1804 audit(1565117390.365:4080): pid=13072 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1410/memory.events" dev="sda1" ino=16927 res=1 [ 3365.446448][ T27] audit: type=1804 audit(1565117390.375:4081): pid=13074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1410/memory.events" dev="sda1" ino=16927 res=1 18:49:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x4000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 18:49:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73]}, 0x48) 18:49:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkalcer\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xfeffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7a000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x252]}, 0x48) 18:49:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkalker\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x6000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) [ 3365.763880][T13108] IPVS: ftp: loaded support on port[0] = 21 18:49:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 18:49:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x80fe]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 18:49:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkalmer\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3366.127161][T13129] IPVS: ftp: loaded support on port[0] = 21 18:49:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkalle\x00@', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) [ 3368.111787][ T27] audit: type=1804 audit(1565117393.055:4083): pid=13128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1875/memory.events" dev="sda1" ino=16897 res=1 [ 3368.143604][ T27] audit: type=1804 audit(1565117393.055:4082): pid=13106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1411/memory.events" dev="sda1" ino=16957 res=1 [ 3368.170171][ T27] audit: type=1800 audit(1565117393.055:4085): pid=13128 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16897 res=0 [ 3368.190899][ T27] audit: type=1800 audit(1565117393.055:4084): pid=13106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16957 res=0 [ 3369.453424][ T27] audit: type=1804 audit(1565117394.395:4086): pid=13155 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1411/memory.events" dev="sda1" ino=16957 res=1 [ 3369.479207][ T27] audit: type=1804 audit(1565117394.395:4087): pid=13157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1411/memory.events" dev="sda1" ino=16957 res=1 18:49:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xff000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 18:49:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xb405]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:49:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x02', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 18:49:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x7a000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:49:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x03', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 18:49:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 18:49:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xb605]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3371.353499][T13184] IPVS: ftp: loaded support on port[0] = 21 [ 3371.363610][T13185] IPVS: ftp: loaded support on port[0] = 21 18:49:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\b', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:49:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) [ 3373.599314][ T27] audit: type=1804 audit(1565117398.545:4088): pid=13179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1876/memory.events" dev="sda1" ino=16955 res=1 [ 3373.631446][ T27] audit: type=1804 audit(1565117398.545:4089): pid=13178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1412/memory.events" dev="sda1" ino=16974 res=1 [ 3373.657108][ T27] audit: type=1800 audit(1565117398.545:4090): pid=13179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16955 res=0 [ 3373.677747][ T27] audit: type=1800 audit(1565117398.545:4091): pid=13178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16974 res=0 [ 3375.967326][ T27] audit: type=1804 audit(1565117400.905:4092): pid=13206 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1412/memory.events" dev="sda1" ino=16974 res=1 [ 3375.992839][ T27] audit: type=1804 audit(1565117400.905:4093): pid=13208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1412/memory.events" dev="sda1" ino=16974 res=1 18:50:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xff0f0000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xc0fe]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 18:50:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 18:50:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\n', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:01 executing program 0: poll(&(0x7f0000000080)=[{}, {}, {}, {}], 0x4, 0x800000000000004e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffdc0, 0x0, 0x0, 0x800e00411) read(r0, &(0x7f0000000100)=""/203, 0xcb) shutdown(r0, 0x0) 18:50:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x0e', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:01 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x48) 18:50:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) [ 3376.635195][T13228] IPVS: ftp: loaded support on port[0] = 21 18:50:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfc00]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0xffffffffffffff94, 0x0, 0x0, 0xfffffffffffffddb) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) close(r2) 18:50:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x10', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3377.652750][ T27] audit: type=1804 audit(1565117402.595:4094): pid=13226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1413/memory.events" dev="sda1" ino=16981 res=1 [ 3379.466797][ T27] audit: type=1800 audit(1565117404.405:4095): pid=13226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16981 res=0 18:50:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 18:50:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x48) 18:50:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfe80]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0xffffffffffffff94, 0x0, 0x0, 0xfffffffffffffddb) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) close(r2) 18:50:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xffefffff) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x48) 18:50:04 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcaa0900]}, 0x48) 18:50:04 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfec0]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x48) [ 3380.035662][T13285] IPVS: ftp: loaded support on port[0] = 21 18:50:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 18:50:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100]}, 0x48) 18:50:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x48) 18:50:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0xffffffffffffff94, 0x0, 0x0, 0xfffffffffffffddb) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) close(r2) [ 3380.920044][ T27] audit: type=1804 audit(1565117405.865:4096): pid=13281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1414/memory.events" dev="sda1" ino=16753 res=1 [ 3382.744878][ T27] audit: type=1800 audit(1565117407.685:4097): pid=13281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16753 res=0 18:50:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xff00]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300]}, 0x48) 18:50:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 18:50:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xffffefff) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0xffffffffffffff94, 0x0, 0x0, 0xfffffffffffffddb) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) close(r2) 18:50:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x48) 18:50:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, 0x48) 18:50:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x100000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3383.155810][T13344] IPVS: ftp: loaded support on port[0] = 21 18:50:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 18:50:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) 18:50:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x1000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000]}, 0x48) [ 3384.101897][ T27] audit: type=1804 audit(1565117409.045:4098): pid=13341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1415/memory.events" dev="sda1" ino=16986 res=1 [ 3385.935568][ T27] audit: type=1800 audit(1565117410.875:4099): pid=13341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16986 res=0 18:50:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000]}, 0x48) 18:50:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 18:50:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0xffffffffffffff94, 0x0, 0x0, 0xfffffffffffffddb) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xffffff7f) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 18:50:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 18:50:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x3000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) [ 3386.534887][T13405] IPVS: ftp: loaded support on port[0] = 21 18:50:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202]}, 0x48) 18:50:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x4000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0xffffffffffffff94, 0x0, 0x0, 0xfffffffffffffddb) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) [ 3387.403139][ T27] audit: type=1804 audit(1565117412.345:4100): pid=13402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1416/memory.events" dev="sda1" ino=17008 res=1 [ 3389.222514][ T27] audit: type=1800 audit(1565117414.165:4101): pid=13402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17008 res=0 18:50:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xfffffff6) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100]}, 0x48) 18:50:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x5000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52020000]}, 0x48) 18:50:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61000000]}, 0x48) 18:50:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x6000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300]}, 0x48) 18:50:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) [ 3389.872709][T13471] IPVS: ftp: loaded support on port[0] = 21 [ 3390.613012][ T27] audit: type=1804 audit(1565117415.555:4102): pid=13470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1417/memory.events" dev="sda1" ino=17169 res=1 [ 3392.533635][ T27] audit: type=1800 audit(1565117417.475:4103): pid=13470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17169 res=0 18:50:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xfffffffb) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000]}, 0x48) 18:50:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100]}, 0x48) 18:50:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x7000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300]}, 0x48) 18:50:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71000000]}, 0x48) 18:50:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x8000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3393.034127][T13507] IPVS: ftp: loaded support on port[0] = 21 [ 3393.894574][ T27] audit: type=1804 audit(1565117418.835:4104): pid=13505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1418/memory.events" dev="sda1" ino=17005 res=1 [ 3393.924867][ T27] audit: type=1800 audit(1565117418.835:4105): pid=13505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17005 res=0 [ 3395.230653][ T27] audit: type=1804 audit(1565117420.175:4106): pid=13522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1418/memory.events" dev="sda1" ino=17005 res=1 [ 3395.255840][ T27] audit: type=1804 audit(1565117420.175:4107): pid=13523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1418/memory.events" dev="sda1" ino=17005 res=1 18:50:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xfffffffe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}, 0x48) 18:50:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73000000]}, 0x48) 18:50:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x9000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) 18:50:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 18:50:20 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xa000000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3395.740589][T13549] IPVS: ftp: loaded support on port[0] = 21 18:50:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) [ 3396.618174][ T27] audit: type=1804 audit(1565117421.555:4108): pid=13540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1419/memory.events" dev="sda1" ino=17337 res=1 [ 3396.659991][ T27] audit: type=1800 audit(1565117421.555:4109): pid=13540 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17337 res=0 [ 3397.969105][ T27] audit: type=1804 audit(1565117422.915:4110): pid=13568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1419/memory.events" dev="sda1" ino=17337 res=1 18:50:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xffffffff000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f]}, 0x48) [ 3397.995254][ T27] audit: type=1804 audit(1565117422.915:4111): pid=13569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1419/memory.events" dev="sda1" ino=17337 res=1 18:50:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xe000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98990a00]}, 0x48) 18:50:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff]}, 0x48) 18:50:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b6c9]}, 0x48) 18:50:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x10000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff]}, 0x48) [ 3398.434558][T13598] IPVS: ftp: loaded support on port[0] = 21 [ 3399.302184][ T27] audit: type=1804 audit(1565117424.245:4112): pid=13593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1420/memory.events" dev="sda1" ino=16516 res=1 [ 3399.329590][ T27] audit: type=1800 audit(1565117424.245:4113): pid=13593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16516 res=0 [ 3400.643671][ T27] audit: type=1804 audit(1565117425.585:4114): pid=13613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1420/memory.events" dev="sda1" ino=16516 res=1 [ 3400.670122][ T27] audit: type=1804 audit(1565117425.595:4115): pid=13614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1420/memory.events" dev="sda1" ino=16516 res=1 18:50:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c3ce]}, 0x48) 18:50:25 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x20000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff]}, 0x48) 18:50:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0x48) 18:50:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2c010000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 18:50:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) [ 3401.194737][T13636] IPVS: ftp: loaded support on port[0] = 21 18:50:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 18:50:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:26 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f0000]}, 0x48) 18:50:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x32000000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3402.042856][ T27] audit: type=1804 audit(1565117426.985:4116): pid=13632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1421/memory.events" dev="sda1" ino=17357 res=1 18:50:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x10030000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3403.807267][ T27] audit: type=1800 audit(1565117428.745:4117): pid=13632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17357 res=0 18:50:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202f00]}, 0x48) 18:50:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}, 0x48) 18:50:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x3f000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) 18:50:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ee000]}, 0x48) 18:50:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x40000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) [ 3404.271188][T13700] IPVS: ftp: loaded support on port[0] = 21 [ 3405.187675][ T27] audit: type=1804 audit(1565117430.125:4118): pid=13696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1422/memory.events" dev="sda1" ino=17046 res=1 [ 3405.224473][ T27] audit: type=1800 audit(1565117430.125:4119): pid=13696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17046 res=0 [ 3406.523350][ T27] audit: type=1804 audit(1565117431.465:4120): pid=13718 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1422/memory.events" dev="sda1" ino=17046 res=1 [ 3406.548980][ T27] audit: type=1804 audit(1565117431.465:4121): pid=13719 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1422/memory.events" dev="sda1" ino=17046 res=1 18:50:31 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x20000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9c]}, 0x48) 18:50:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f2000]}, 0x48) 18:50:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x60000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f]}, 0x48) 18:50:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x8dffffff]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000]}, 0x48) 18:50:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3407.015802][T13747] IPVS: ftp: loaded support on port[0] = 21 [ 3407.875809][ T27] audit: type=1804 audit(1565117432.815:4122): pid=13739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1423/memory.events" dev="sda1" ino=17080 res=1 [ 3407.901718][ T27] audit: type=1800 audit(1565117432.815:4123): pid=13739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17080 res=0 [ 3409.212197][ T27] audit: type=1804 audit(1565117434.155:4124): pid=13763 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1423/memory.events" dev="sda1" ino=17080 res=1 [ 3409.237682][ T27] audit: type=1804 audit(1565117434.155:4125): pid=13764 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1423/memory.events" dev="sda1" ino=17080 res=1 18:50:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xf0ffffff0f0000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000]}, 0x48) 18:50:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x48) 18:50:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x3, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xb4050000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffabfff000]}, 0x48) 18:50:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xb6050000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}, 0x48) 18:50:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xa, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3409.660510][T13788] IPVS: ftp: loaded support on port[0] = 21 [ 3410.668121][ T27] audit: type=1804 audit(1565117435.605:4126): pid=13782 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1424/memory.events" dev="sda1" ino=17400 res=1 [ 3410.780088][ T27] audit: type=1800 audit(1565117435.605:4127): pid=13782 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17400 res=0 [ 3411.993706][ T27] audit: type=1804 audit(1565117436.935:4128): pid=13802 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1424/memory.events" dev="sda1" ino=17400 res=1 18:50:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x100000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xe, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 18:50:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe02e00]}, 0x48) 18:50:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xe4ffffff]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3412.028187][ T27] audit: type=1804 audit(1565117436.935:4129): pid=13803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1424/memory.events" dev="sda1" ino=17400 res=1 18:50:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) 18:50:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 18:50:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x10, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 18:50:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xf5ffffff]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) [ 3412.387391][T13834] IPVS: ftp: loaded support on port[0] = 21 [ 3413.338164][ T27] audit: type=1804 audit(1565117438.275:4130): pid=13829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1425/memory.events" dev="sda1" ino=16593 res=1 [ 3413.384831][ T27] audit: type=1800 audit(1565117438.275:4131): pid=13829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16593 res=0 [ 3414.683074][ T27] audit: type=1804 audit(1565117439.625:4132): pid=13834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1425/memory.events" dev="sda1" ino=16593 res=1 [ 3414.709590][ T27] audit: type=1804 audit(1565117439.635:4133): pid=13836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1425/memory.events" dev="sda1" ino=16593 res=1 18:50:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x200000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 18:50:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) 18:50:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x300, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, 0x0, 0x0) 18:50:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfc000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, 0x0, 0x0) 18:50:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xa00, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfe800000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 18:50:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000]}, 0x48) 18:50:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, 0x0, 0x0) [ 3415.142823][T13878] IPVS: ftp: loaded support on port[0] = 21 [ 3416.018413][ T27] audit: type=1804 audit(1565117440.965:4134): pid=13872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1426/memory.events" dev="sda1" ino=17169 res=1 [ 3416.044206][ T27] audit: type=1800 audit(1565117440.965:4135): pid=13872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17169 res=0 [ 3417.366184][ T27] audit: type=1804 audit(1565117442.305:4136): pid=13897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1426/memory.events" dev="sda1" ino=17169 res=1 18:50:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x300000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xe00, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3417.391723][ T27] audit: type=1804 audit(1565117442.315:4137): pid=13898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1426/memory.events" dev="sda1" ino=17169 res=1 18:50:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfec00000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40340000000000]}, 0x48) 18:50:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 18:50:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 18:50:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x2000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xff000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 18:50:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 18:50:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000]}, 0x48) 18:50:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) [ 3417.835222][T13923] IPVS: ftp: loaded support on port[0] = 21 [ 3418.708119][ T27] audit: type=1804 audit(1565117443.645:4138): pid=13919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1427/memory.events" dev="sda1" ino=17137 res=1 [ 3418.767539][ T27] audit: type=1800 audit(1565117443.645:4139): pid=13919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17137 res=0 [ 3420.045465][ T27] audit: type=1804 audit(1565117444.985:4140): pid=13942 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1427/memory.events" dev="sda1" ino=17137 res=1 [ 3420.070938][ T27] audit: type=1804 audit(1565117444.985:4141): pid=13943 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1427/memory.events" dev="sda1" ino=17137 res=1 18:50:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x400000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x4000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 18:50:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xffffff8d]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}, 0x48) 18:50:45 executing program 0: poll(&(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x5, 0x800000000000004e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x156, 0x0, 0x0, 0x800e003be) read(r0, &(0x7f0000000100)=""/203, 0xcb) shutdown(r0, 0x0) 18:50:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffabff030000]}, 0x48) 18:50:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 18:50:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xff00, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xffffffe4]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x46, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x91, 0x0, 0x0, 0x800e004e1) shutdown(r1, 0x0) [ 3420.465649][T13968] IPVS: ftp: loaded support on port[0] = 21 18:50:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x200000, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3421.508211][ T27] audit: type=1804 audit(1565117446.445:4142): pid=13962 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1428/memory.events" dev="sda1" ino=17424 res=1 [ 3421.555329][ T27] audit: type=1800 audit(1565117446.445:4143): pid=13962 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17424 res=0 [ 3422.844210][ T27] audit: type=1804 audit(1565117447.785:4144): pid=13992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1428/memory.events" dev="sda1" ino=17424 res=1 18:50:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 18:50:47 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) 18:50:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e40)={{{@in6=@initdev, @in=@remote}}, {{}, 0x0, @in6=@initdev}}, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000007400), 0x0) sendmmsg$inet(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="7c6bfd37a5e49ba15c5d609a4960f33b5fba5776c5719e58b5491d5a1306d9324cb3309b5d709d646f783216c0a66f6ff7f5fe179db3ff4a5e9fdc711e344c1801e0e0d1679fb8b4728596cd01b1b8f75a2e400a0eb169fbce8b5dd9376e5cfc0e80fcfba08f2ef45490683848855594eeb0b6b6e672ed4a5bfa60709e6b", 0x7e}, {&(0x7f0000000640)="bb3b2f784732b48adb1cb6c285b1e35b74058ef963759f01d2b757ac9631c1281186dc3f3507a9da3f2614e57bde5dd5f5cd329ced59d35d44d10705afe3ecf2779e935ffa4187b1d99121b7f59251a5c9132a6eb2956b0d71b1554c835f6576d1d6ad6f20798b1c33e08bce1e2b2cdd1c584172da6ba4f68a36417c6facd7656ee346b6c722c8b2e3630e9e242adbcae3152f0186071743a5ea0910874cde01c6260df85d7880194b1de2b699c687bd8effeb72c391cf13a6", 0xb9}, {&(0x7f0000000740)="a297f2e604aadec5c645f35b80c7544122a441bcaffe3e09298a4bba34b646d8c5d4617e64f4de851f7948aad5f7e55716621c55f0362dcf6b917d3c1cec3e046690815202ffd1daa3123afada9a64e92796f4e3f048f9851fe628cda1b3730791244f41568ac39137e630c8bf249876b88ea327f0712b49d04f88f243e5588841dd919c0aaf272edb840f6a5944a91bb4ab2cbbe8744c5007bcaa1bc19bfda7f96a74aff9074d1384bab1277b9a9ab0ceabd9ed93adfd6fe1cb613a55e082c4d9ee37080efa309f96b9b1dfddfa0a903e3a470dd52d8859fbc40641f6d7efcc307e8967cd9f3348fa", 0xe9}, {&(0x7f0000000340)="d8d576c87a60513b75d90996e6d0006461d907fbb936daeac2f2f480bcbc389fdc1be5e3ff860a5f7e03f108e2be4604380964348fa121adbae7a422a4cbe6a81ace00a6cc00341cd5dab95024772e92c7300bec3048aed0868c939e6cd000f56f33ade473d68877501a9c84d9ee70dad74bb998364098", 0x77}, {&(0x7f0000000840)="b0993ed458ae636eb524c0897e7e81619874fa32b4bb26995c07d3b59d2323eb12bb77c4a4185b7b2ddeddd5cc4252c0959a1b26df09cbc9e3144f5f64e7f618ec9483bc468637775d8358dcc5e8b48700b18924bc83ded34631e18fd4eb7370ed32778aa5a06069c6fda337c32dd640971ef96916f5b1e400b9732a2dbfac688c839b8376dfd3178fe45e8224537af80de6de65140a282d22f927e0d7221222482a0f71ec3445eda82627e514f7430464ceeb60b2c3d51d97558fd7ec7842c4ba", 0xc1}, {&(0x7f0000001340)="70296747a8895f6b6c04c2eae82b2abb0e8b9224de88f3ab02fa42e3d317c8a5917aafa9e6a5b3b8063dcf71ff57303ce4a77f841c507c66bd8d222fe063cacc49f1a12b8cdc3d78fd48d402cada23898f8c65a9467af92107e27260e7b7ee42dc8ab30cf1726aef0b8d5951ba7e4cf501c1059a80946f5f27ce41249a39ac5621b9a32fb30bab44425530f09e0c7aab89e739ab7fefa7a71e1b7277193797b9ed7ca87749ffbf85b7c45c9ebabd82007de885b9f207db35d3cddcfd6f73a208d46f3a5affb465a0e61633f8b9943f459e387bd0be894fd2311e5ac80b92a18f8c90a4c3ddf0a500cd6bd00f922af570ab4215c7b181145fee22f173a3fb879d408fbddfaed58fd7e5c1a5cb1eb67e31ed66015614d807e9d239a4f632e232c232e66109ec59e844e677d34c79b9e8c909f253b6a5a0db8ea2c82fc3f1bb1369dbc1c264681cd787c53b911437c32110d082fa065f1c7d5e25b72f78256fa50931aa5b6550137b2d3edcbd2cb00b2f1dd4a4bbbff821bb19bf9119edf0274f4deb71f4b27ef36bf7d778e9dea973281d30f8055dc8e94c431a0717e089dce0d25aec56eed0407825259f7c0bec13694c751316047e1cb55ca8dbaf6f5932822719d864b398d0dda777268d72988a9982119f391e6f4f13c988dd2e208c3c5086cbd6b0d853176614bbe5a65a7a94b75e136b63ebf4bf8079eb40dcbd420ab49b110cacdbc555b9d78cc46289929c649e92f274bd982200bc97912a324eba39f411c07e913b725a2c3c4d32b1dd104746cd5b1384031339c067f89a1c76892bd5fe4edffbddcd85ef85e5cd9492dd1cc62cb1de5ab9f8f4c3ff08004bcd626e913938caa38fbf88e962e8a117a3502ab395c4ce3aed44be7d2880c0904479b0c197834ea164acdac2568f031945206433f46af51102fb5a2885f9a7c9427340710ed12392390561498bee0ae2baad666f5fbf969d69c9627f0898ff63c3da5646d7291f0777e80cc0ea022c6aeea62783e81e72e448072f0576b94b27ac44e1ba3cb5cfec291a94561fb8cecd2d06e8d96e058130c8fbbf84302e5dbf91114ea5dabbe2adeab444383e48de967bc50a328496c69fe2a08a8ca569c2d1fc35a4390dcd4c7472fdc2e6d2ca89e3c68effd82d8c903d1a8a458c4b96163d447ea0d4d7711ef175a814062b37082c466cfad7171316917df12d74117659708f1a7a5c56ea908d3049cfd985a5d31f024c935bf83b8fde7b97a95a2307dfd4fad5135d9af6ceba93d689a4f4fbcc3a4a2c42b9b4eb3af441403a7d8b8653f4d4598940f4b7cf5e2ed9821f64160ddf8c638411f409d883afb6638700bb672f5160b6981aba25e7b0e4f7a05cc6c5b06ff3f82beb92e918293301cc5204ef1c913df312f4ddd1f1d8b3ff067d5f98f49bd46211b3411297d5755eae5d379858a90ed942c6c4f351704020e524ad3949d3fb5ec4b8f0c060caa011ec13edb838c9fded230ae84a5e6fc04802b332dc5a5c95b7b6d946ebbcc385c74bc401eb151f1714cbaedd65e454809f0071f2f190d2fcdcb33f3b5c13b0f622004707f54b36fb070be4c4eedce636c9ba397400ec0cf4b80d4fcaa729af3006676aafd822d93c40a41b76ccca51d6c4e6a755b9bce5411c", 0x48f}], 0x6}}, {{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000004140)="c04fc75150ae8ca6e9469c52fc31ee24056f499e4802573c810945fa581f994d4d294835b4952c979a825d2717aae14066419a6f09139117d7bc7488ec17feb6b358a62ac7ad0476cf1f450ea3ebe196a888dd9595ed2cba674ade2c8e5d1687425f4bf25c2a53b67e131149", 0x6c}, {&(0x7f00000041c0)="fe52c909d4a65602bb28f6cd2ee42da361f14e839cb0234f91fd2425d9bd26bf69d91c1d6ea3f01ccac1e693cbdb069fcabaf7e72f6d69284d27b727c183a1a550fdaec8da823419f7178a3958d0668c0696d05a0f53628641cea4451a374ea32be522c30907da72905414bf524eefa23fd5d35f7fa4a25fde96b362087ebbab19a31f1900b1db6782fefe5f8a4a9a5f147cde", 0x93}, {&(0x7f00000042c0)="729d72f8e43702a23f2622a0cad59769c7295e0d362e9d845d92e13e9c2aa0cc4e3d6cb4264aa2bd3f43e55e8107675620ae6c79c0dbdddb66e5c38e393371da575520d6fb8e605f475f73699af0a33ef2bc213e71ebb1f0735e8da64d930e33015803ac334e62e7f5bbc247a77a1802e70f71b343202dae0c65ec0d282e0d2071b5abd7a23200a46966f7a086227a71a0d000fa16dc8472e6f9bf317b36", 0x9e}, {&(0x7f0000004380)="7fca19c15a671b802bc7faab73c539d246a01306ad6333249f0464942d1ea148a8581f79f0f6f9cbe92229d14b256e1be54e4e16b0a774715b2dd1b7056f8d8ca26bc7f1016d4f", 0x47}], 0x4, &(0x7f0000004440)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3a6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}], 0x30}}, {{0x0, 0x0, &(0x7f0000005a80)=[{&(0x7f0000004480)="0425992624af5f36e9f72e419d6ee7c3780cbb962c3a5adfc12f679b23f430b61553a743eac3ca1bf7143f65b4d4810db47f0623305d34d5170059e76e1e660cd30613a38888e1513504099ddd1e5370ffdefe6c907b8d1aaea95296294dbac6341b6c31cd1605a6f2719fef2261fb3153210d81d9a564a31db1", 0x7a}, {0x0}, {&(0x7f0000004700)="e5d7a29d5a5487c7d0c889fa2ad7ebe965379ab2fd976d33e85b5715ca23aa4f65e5f4c6673f4c22c30e119b3d99a4f8a3e372691255909e5524559de89a7d068f08fa81767bf077184899087ff68cd07e3f2ef7666077cfffc3d54f7188126643b47d3e09fc9e8eef6fc8127ce3a4ea971b5e492b37cb853c5f996d6aacc796c29e11fd64b8a32b78b5", 0x8a}, {0x0}, {&(0x7f0000004900)="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", 0x3f2}], 0x5, &(0x7f0000005b80)}}, {{0x0, 0x0, &(0x7f0000006240)=[{0x0}, {&(0x7f0000005d80)}, {0x0}, {0x0}], 0x4}}], 0x4, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x10, 0x0, 0x27) 18:50:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3422.870438][ T27] audit: type=1804 audit(1565117447.785:4145): pid=13993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1428/memory.events" dev="sda1" ino=17424 res=1 18:50:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfffffff5]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x410030000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 18:50:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x2000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 18:50:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x8000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x48) [ 3423.308814][T14020] IPVS: ftp: loaded support on port[0] = 21 18:50:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x3000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 18:50:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x1000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000580)=0x1, 0x4) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4fe) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 18:50:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x48) 18:50:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x8000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3424.208493][ T27] audit: type=1804 audit(1565117449.155:4146): pid=14015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1429/memory.events" dev="sda1" ino=17438 res=1 [ 3426.017806][ T27] audit: type=1800 audit(1565117450.955:4147): pid=14015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17438 res=0 18:50:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x500000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x10000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 18:50:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xffffffe4]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xa000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 18:50:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xe000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x100000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 18:50:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x48) 18:50:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x410030000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x10000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3426.482259][T14085] IPVS: ftp: loaded support on port[0] = 21 [ 3426.897699][T14101] IPVS: ftp: loaded support on port[0] = 21 [ 3428.722388][ T27] audit: type=1804 audit(1565117453.665:4148): pid=14100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1919/memory.events" dev="sda1" ino=17439 res=1 [ 3428.748184][ T27] audit: type=1800 audit(1565117453.665:4149): pid=14100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17439 res=0 [ 3428.770760][ T27] audit: type=1804 audit(1565117453.665:4150): pid=14080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1430/memory.events" dev="sda1" ino=16850 res=1 [ 3428.798160][ T27] audit: type=1800 audit(1565117453.675:4151): pid=14080 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16850 res=0 [ 3430.057822][ T27] audit: type=1804 audit(1565117454.995:4152): pid=14103 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1430/memory.events" dev="sda1" ino=16850 res=1 [ 3430.083170][ T27] audit: type=1804 audit(1565117455.005:4153): pid=14105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1430/memory.events" dev="sda1" ino=16850 res=1 18:50:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x600000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21000000]}, 0x48) 18:50:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 18:50:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x40000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x200000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x100000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 18:50:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x500000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:50:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xff000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:50:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x300000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:50:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000]}, 0x48) [ 3431.896031][ T27] audit: type=1804 audit(1565117456.835:4154): pid=14123 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1431/memory.events" dev="sda1" ino=17111 res=1 [ 3432.028521][T14123] IPVS: ftp: loaded support on port[0] = 21 [ 3432.059947][ T27] audit: type=1804 audit(1565117456.875:4155): pid=14122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1431/memory.events" dev="sda1" ino=17111 res=1 18:50:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3432.214806][T14138] IPVS: ftp: loaded support on port[0] = 21 [ 3432.895635][ T27] audit: type=1804 audit(1565117457.835:4156): pid=14123 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1431/memory.events" dev="sda1" ino=17111 res=1 [ 3432.925327][T14151] IPVS: ftp: loaded support on port[0] = 21 18:51:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) 18:51:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000]}, 0x48) 18:51:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x400000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x20000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:51:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x700000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x410030000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x100000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:51:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 18:51:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 18:51:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x500000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3435.836516][T14174] IPVS: ftp: loaded support on port[0] = 21 18:51:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x200000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3435.932408][T14181] IPVS: ftp: loaded support on port[0] = 21 18:51:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 18:51:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcaa090000000000]}, 0x48) 18:51:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x600000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x300000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:51:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x48) [ 3437.525574][ T27] audit: type=1804 audit(1565117462.465:4157): pid=14177 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1432/memory.events" dev="sda1" ino=17122 res=1 [ 3437.552409][ T27] audit: type=1800 audit(1565117462.465:4158): pid=14177 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17122 res=0 [ 3438.234679][ T27] audit: type=1804 audit(1565117463.175:4159): pid=14170 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1922/memory.events" dev="sda1" ino=17131 res=1 [ 3438.261011][ T27] audit: type=1800 audit(1565117463.175:4160): pid=14170 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17131 res=0 [ 3439.566637][ T27] audit: type=1804 audit(1565117464.505:4161): pid=14212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1432/memory.events" dev="sda1" ino=17122 res=1 [ 3439.592034][ T27] audit: type=1804 audit(1565117464.505:4162): pid=14213 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1432/memory.events" dev="sda1" ino=17122 res=1 18:51:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x800000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xffffff8d]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 18:51:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) 18:51:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x800000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:51:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x700000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 18:51:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xa00000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:51:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52020000]}, 0x48) 18:51:06 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x800000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xe00000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3441.491352][T14234] IPVS: ftp: loaded support on port[0] = 21 18:51:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfec00000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3442.355274][ T27] audit: type=1804 audit(1565117467.295:4163): pid=14231 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1433/memory.events" dev="sda1" ino=16705 res=1 [ 3442.381224][ T27] audit: type=1800 audit(1565117467.295:4164): pid=14231 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16705 res=0 [ 3443.697612][ T27] audit: type=1804 audit(1565117468.635:4165): pid=14260 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1433/memory.events" dev="sda1" ino=16705 res=1 [ 3443.722773][ T27] audit: type=1804 audit(1565117468.645:4166): pid=14261 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1433/memory.events" dev="sda1" ino=16705 res=1 18:51:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61000000]}, 0x48) 18:51:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x48) 18:51:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x900000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1000000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:51:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x900000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x200000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x4000000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:51:08 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000]}, 0x48) 18:51:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xa00000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0x48) [ 3443.997039][ T27] audit: type=1804 audit(1565117468.935:4167): pid=14277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1434/memory.events" dev="sda1" ino=16849 res=1 [ 3444.066467][T14277] IPVS: ftp: loaded support on port[0] = 21 [ 3444.215238][T14284] IPVS: ftp: loaded support on port[0] = 21 18:51:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xe00000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xff00000000000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) 18:51:09 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300000000000000]}, 0x48) 18:51:09 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71000000]}, 0x48) 18:51:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x1000000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0xffffffff00000000, 0x99, &(0x7f0000000180)=""/153}, 0x16) [ 3445.080651][T14320] IPVS: ftp: loaded support on port[0] = 21 [ 3446.399064][ T27] audit: type=1804 audit(1565117471.335:4168): pid=14279 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1925/memory.events" dev="sda1" ino=16689 res=1 [ 3446.442625][ T27] audit: type=1800 audit(1565117471.335:4169): pid=14279 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16689 res=0 [ 3446.466740][ T27] audit: type=1804 audit(1565117471.345:4170): pid=14278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1434/memory.events" dev="sda1" ino=16849 res=1 [ 3446.493272][ T27] audit: type=1800 audit(1565117471.345:4171): pid=14278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16849 res=0 18:51:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xa00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, 0x48) 18:51:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73000000]}, 0x48) 18:51:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2000000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x2}, 0x16) 18:51:14 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3) sendmmsg$inet_sctp(r0, &(0x7f0000001880)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="20000000f87f00000000000000000067"], 0x10}], 0x1, 0x0) 18:51:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x4, 0x4b8, 0x6}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f00000001c0), &(0x7f0000000000)=""/8}, 0x18) 18:51:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x3}, 0x16) 18:51:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff]}, 0x48) 18:51:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 18:51:14 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2c01000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3449.554139][T14345] IPVS: ftp: loaded support on port[0] = 21 18:51:14 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) [ 3450.498240][ T27] audit: type=1804 audit(1565117475.435:4172): pid=14340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1435/memory.events" dev="sda1" ino=17217 res=1 [ 3450.524417][ T27] audit: type=1800 audit(1565117475.435:4173): pid=14340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17217 res=0 [ 3451.855673][ T27] audit: type=1804 audit(1565117476.795:4174): pid=14369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1435/memory.events" dev="sda1" ino=17217 res=1 18:51:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xb00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x77, &(0x7f0000000080)={r1}, 0x14) 18:51:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x3200000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff]}, 0x48) 18:51:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x8}, 0x16) 18:51:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) [ 3451.890471][ T27] audit: type=1804 audit(1565117476.795:4175): pid=14370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1435/memory.events" dev="sda1" ino=17217 res=1 18:51:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff]}, 0x48) 18:51:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xa}, 0x16) 18:51:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="3100000013000900690006007a000010ab008008100000004600010700000054090003c0256465a3000000000075702e1a", 0x31}], 0x1) 18:51:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202000000000000]}, 0x48) 18:51:17 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x3f00000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3452.274908][T14392] IPVS: ftp: loaded support on port[0] = 21 18:51:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r0, &(0x7f00003de000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f0000681000)=@abs, 0x8) [ 3453.184703][ T27] audit: type=1804 audit(1565117478.125:4176): pid=14389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1436/memory.events" dev="sda1" ino=17455 res=1 [ 3453.241601][ T27] audit: type=1800 audit(1565117478.125:4177): pid=14389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17455 res=0 [ 3454.535574][ T27] audit: type=1804 audit(1565117479.475:4178): pid=14416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1436/memory.events" dev="sda1" ino=17455 res=1 [ 3454.560979][ T27] audit: type=1804 audit(1565117479.475:4179): pid=14417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1436/memory.events" dev="sda1" ino=17455 res=1 18:51:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xc00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xe}, 0x16) 18:51:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000]}, 0x48) 18:51:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9b60800]}, 0x48) 18:51:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x4000000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x75, &(0x7f0000000000)=@assoc_value={r1}, &(0x7f0000000040)=0x8) 18:51:19 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x2000004e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 18:51:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000]}, 0x48) 18:51:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x10}, 0x16) 18:51:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcec30800]}, 0x48) 18:51:19 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x6000000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:20 executing program 0: [ 3455.119204][T14450] IPVS: ftp: loaded support on port[0] = 21 [ 3455.929098][ T27] audit: type=1804 audit(1565117480.875:4180): pid=14446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1437/memory.events" dev="sda1" ino=17465 res=1 [ 3455.955547][ T27] audit: type=1800 audit(1565117480.875:4181): pid=14446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17465 res=0 [ 3457.272582][ T27] audit: type=1804 audit(1565117482.215:4182): pid=14463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1437/memory.events" dev="sda1" ino=17465 res=1 [ 3457.298186][ T27] audit: type=1804 audit(1565117482.215:4183): pid=14464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1437/memory.events" dev="sda1" ino=17465 res=1 18:51:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xc10030000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000]}, 0x48) 18:51:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x300}, 0x16) 18:51:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff]}, 0x48) 18:51:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x8dffffff00000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:22 executing program 0: 18:51:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xa00}, 0x16) 18:51:22 executing program 0: 18:51:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 18:51:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xb405000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000]}, 0x48) [ 3457.726796][T14488] IPVS: ftp: loaded support on port[0] = 21 18:51:22 executing program 0: [ 3458.615962][ T27] audit: type=1804 audit(1565117483.555:4184): pid=14484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1438/memory.events" dev="sda1" ino=17139 res=1 [ 3458.652552][ T27] audit: type=1800 audit(1565117483.595:4185): pid=14484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17139 res=0 [ 3459.971667][ T27] audit: type=1804 audit(1565117484.915:4186): pid=14505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1438/memory.events" dev="sda1" ino=17139 res=1 [ 3459.997586][ T27] audit: type=1804 audit(1565117484.915:4187): pid=14506 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1438/memory.events" dev="sda1" ino=17139 res=1 18:51:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xd00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f0000]}, 0x48) 18:51:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xe00}, 0x16) 18:51:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) 18:51:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xb605000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:25 executing program 0: 18:51:25 executing program 0: 18:51:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x2000}, 0x16) 18:51:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x98990a0000000000]}, 0x48) 18:51:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}, 0x48) 18:51:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xe4ffffff00000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:25 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x1, 0x0, @dev, 0x2}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000100)={@random="6bff2a139fcc", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) [ 3460.546406][T14535] IPVS: ftp: loaded support on port[0] = 21 [ 3461.304540][ T27] audit: type=1804 audit(1565117486.245:4188): pid=14530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1439/memory.events" dev="sda1" ino=16485 res=1 [ 3461.352634][ T27] audit: type=1800 audit(1565117486.275:4189): pid=14530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16485 res=0 [ 3462.657015][ T27] audit: type=1804 audit(1565117487.595:4190): pid=14549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1439/memory.events" dev="sda1" ino=16485 res=1 18:51:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xe00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000]}, 0x48) 18:51:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x4000}, 0x16) 18:51:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xf5ffffff00000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff85]}, 0x48) 18:51:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x9, 0x0, &(0x7f0000000040)=0xabbe) [ 3462.691392][ T27] audit: type=1804 audit(1565117487.595:4191): pid=14550 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1439/memory.events" dev="sda1" ino=16485 res=1 18:51:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xff00}, 0x16) 18:51:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfc00000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000]}, 0x48) 18:51:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9c]}, 0x48) 18:51:27 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, 0x0, &(0x7f0000000140)) 18:51:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x200000}, 0x16) [ 3463.196374][T14579] IPVS: ftp: loaded support on port[0] = 21 [ 3463.992754][ T27] audit: type=1804 audit(1565117488.935:4192): pid=14569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1440/memory.events" dev="sda1" ino=17147 res=1 [ 3464.019629][ T27] audit: type=1800 audit(1565117488.935:4193): pid=14569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17147 res=0 [ 3465.328771][ T27] audit: type=1804 audit(1565117490.275:4194): pid=14585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1440/memory.events" dev="sda1" ino=17147 res=1 [ 3465.354156][ T27] audit: type=1804 audit(1565117490.275:4195): pid=14579 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1440/memory.events" dev="sda1" ino=17147 res=1 18:51:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xf00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9f]}, 0x48) 18:51:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x48) 18:51:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000001503000028feffff720af0fff8ffffff71a4f0ff00000000b706000000000001dd400300000000003406000001ed000071100c00000000006c640000000000007b1300fe000000008500000007000000b7000000000000009500000000000000023bc065b7a379d179fc9e88af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7796001b1470d1259965a7239456d12cc8d46e5512bb7"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 18:51:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x1000000}, 0x16) 18:51:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfe80000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x2000000}, 0x16) 18:51:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x48) 18:51:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x11, 0x800000003, 0x81) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r1, &(0x7f0000002340)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}}, 0x20) 18:51:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfec0000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 18:51:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x3000000}, 0x16) [ 3465.863830][T14627] IPVS: ftp: loaded support on port[0] = 21 [ 3466.778089][ T27] audit: type=1804 audit(1565117491.715:4196): pid=14623 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1441/memory.events" dev="sda1" ino=17164 res=1 [ 3466.816666][ T27] audit: type=1800 audit(1565117491.715:4197): pid=14623 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17164 res=0 [ 3468.124797][ T27] audit: type=1804 audit(1565117493.065:4198): pid=14640 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1441/memory.events" dev="sda1" ino=17164 res=1 [ 3468.178079][ T27] audit: type=1804 audit(1565117493.065:4199): pid=14641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1441/memory.events" dev="sda1" ino=17164 res=1 18:51:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1000000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ffabfff000]}, 0x48) 18:51:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xff00000000000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xe00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f000000000000]}, 0x48) 18:51:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x8000000}, 0x16) 18:51:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xa000000}, 0x16) 18:51:33 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 18:51:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xffffffff00000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 18:51:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xe000000}, 0x16) [ 3468.671223][T14666] IPVS: ftp: loaded support on port[0] = 21 [ 3468.695733][T14670] IPVS: ftp: loaded support on port[0] = 21 18:51:33 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x2]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3469.771415][T14690] IPVS: ftp: loaded support on port[0] = 21 [ 3470.805399][ T27] audit: type=1804 audit(1565117495.745:4200): pid=14660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1944/memory.events" dev="sda1" ino=17164 res=1 [ 3470.831985][ T27] audit: type=1800 audit(1565117495.745:4201): pid=14660 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17164 res=0 [ 3472.200418][ T27] audit: type=1804 audit(1565117497.145:4202): pid=14658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1442/memory.events" dev="sda1" ino=17505 res=1 18:51:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1100000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) 18:51:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) [ 3472.232811][ T27] audit: type=1800 audit(1565117497.145:4203): pid=14658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17505 res=0 [ 3472.261320][ T27] audit: type=1804 audit(1565117497.145:4204): pid=14670 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1442/memory.events" dev="sda1" ino=17505 res=1 [ 3472.357623][ T27] audit: type=1804 audit(1565117497.145:4205): pid=14674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1442/memory.events" dev="sda1" ino=17505 res=1 18:51:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xd00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x10000000}, 0x16) 18:51:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x3]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 18:51:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000]}, 0x48) [ 3472.548059][ T27] audit: type=1804 audit(1565117497.145:4206): pid=14688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1442/memory.events" dev="sda1" ino=17505 res=1 18:51:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202f0000000000]}, 0x48) 18:51:37 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 18:51:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x40000000}, 0x16) [ 3472.730694][T14713] IPVS: ftp: loaded support on port[0] = 21 [ 3472.786042][ T27] audit: type=1804 audit(1565117497.725:4207): pid=14722 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1945/memory.events" dev="sda1" ino=16689 res=1 18:51:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x4]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3472.946323][T14715] IPVS: ftp: loaded support on port[0] = 21 [ 3473.523370][ T27] audit: type=1804 audit(1565117498.465:4208): pid=14712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1443/memory.events" dev="sda1" ino=16657 res=1 [ 3475.406087][ T27] audit: type=1800 audit(1565117500.345:4209): pid=14712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16657 res=0 18:51:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xff000000}, 0x16) 18:51:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000]}, 0x48) 18:51:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 18:51:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x5]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1200000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 18:51:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 18:51:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x1000000000000}, 0x16) 18:51:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xa00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000]}, 0x48) 18:51:40 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x6]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 18:51:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x20000000000000}, 0x16) 18:51:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}, 0x48) [ 3475.969889][T14771] IPVS: ftp: loaded support on port[0] = 21 18:51:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x7]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:41 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 3476.246126][T14782] IPVS: ftp: loaded support on port[0] = 21 [ 3478.116893][ T27] audit: type=1804 audit(1565117503.055:4210): pid=14768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1444/memory.events" dev="sda1" ino=16881 res=1 [ 3478.146150][ T27] audit: type=1800 audit(1565117503.055:4211): pid=14768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16881 res=0 [ 3478.167279][ T27] audit: type=1804 audit(1565117503.055:4212): pid=14781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1947/memory.events" dev="sda1" ino=17059 res=1 [ 3478.193255][ T27] audit: type=1800 audit(1565117503.055:4213): pid=14781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17059 res=0 [ 3479.472800][ T27] audit: type=1804 audit(1565117504.415:4214): pid=14772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1444/memory.events" dev="sda1" ino=16881 res=1 [ 3479.498224][ T27] audit: type=1804 audit(1565117504.415:4215): pid=14771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1444/memory.events" dev="sda1" ino=16881 res=1 18:51:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1300000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x100000000000000}, 0x16) 18:51:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe02e0000000000]}, 0x48) 18:51:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x8]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:45 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 18:51:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x10030000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x48) 18:51:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x200000000000000}, 0x16) 18:51:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffabff030000]}, 0x48) [ 3481.193749][ T27] audit: type=1804 audit(1565117506.135:4216): pid=14818 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1948/memory.events" dev="sda1" ino=16881 res=1 18:51:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) 18:51:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x300000000000000}, 0x16) [ 3481.338438][T14813] IPVS: ftp: loaded support on port[0] = 21 18:51:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x9]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3481.400551][T14826] IPVS: ftp: loaded support on port[0] = 21 [ 3482.166352][ T27] audit: type=1804 audit(1565117507.105:4217): pid=14825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1445/memory.events" dev="sda1" ino=16609 res=1 [ 3484.078460][ T27] audit: type=1800 audit(1565117509.025:4218): pid=14825 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16609 res=0 18:51:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x800000000000000}, 0x16) 18:51:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 18:51:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 18:51:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xa]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x9]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1400000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xa00000000000000}, 0x16) 18:51:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 18:51:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x48) 18:51:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1300000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xe]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3484.620125][T14870] IPVS: ftp: loaded support on port[0] = 21 18:51:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xe00000000000000}, 0x16) 18:51:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23]}, 0x48) 18:51:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 18:51:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 18:51:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x10]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x1000000000000000}, 0x16) [ 3484.949845][T14889] IPVS: ftp: loaded support on port[0] = 21 [ 3486.902507][ T27] audit: type=1804 audit(1565117511.845:4219): pid=14865 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1446/memory.events" dev="sda1" ino=17169 res=1 [ 3486.939046][ T27] audit: type=1800 audit(1565117511.845:4220): pid=14865 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17169 res=0 [ 3486.968720][ T27] audit: type=1804 audit(1565117511.875:4221): pid=14881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1950/memory.events" dev="sda1" ino=17193 res=1 [ 3487.002953][ T27] audit: type=1800 audit(1565117511.875:4222): pid=14881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17193 res=0 [ 3489.227449][ T27] audit: type=1804 audit(1565117514.165:4223): pid=14906 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1446/memory.events" dev="sda1" ino=17169 res=1 [ 3489.252815][ T27] audit: type=1804 audit(1565117514.165:4224): pid=14908 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1446/memory.events" dev="sda1" ino=17169 res=1 18:51:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x4000000000000000}, 0x16) 18:51:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, 0x48) 18:51:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 18:51:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1500000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1400000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:51:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x32]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xff00000000000000}, 0x16) 18:51:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 18:51:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 18:51:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0xffffffff00000000}, 0x16) [ 3490.072210][T14928] IPVS: ftp: loaded support on port[0] = 21 18:51:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 18:51:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}, 0x48) [ 3490.172569][T14941] IPVS: ftp: loaded support on port[0] = 21 18:51:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x60]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:51:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x2}, 0x16) 18:51:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63]}, 0x48) [ 3491.068412][ T27] audit: type=1804 audit(1565117516.015:4225): pid=14923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1447/memory.events" dev="sda1" ino=16708 res=1 [ 3492.290465][ T27] audit: type=1804 audit(1565117517.235:4226): pid=14940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1951/memory.events" dev="sda1" ino=17199 res=1 [ 3492.317817][ T27] audit: type=1800 audit(1565117517.235:4227): pid=14940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17199 res=0 [ 3492.743416][ T27] audit: type=1800 audit(1565117517.685:4228): pid=14923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16708 res=0 18:52:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1600000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x48) 18:52:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x3}, 0x16) 18:52:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xfc]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71]}, 0x48) 18:52:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x8]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8}, 0x16) 18:52:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73]}, 0x48) 18:52:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 18:52:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x12c]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x252]}, 0x48) 18:52:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1500000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3495.617149][T14989] IPVS: ftp: loaded support on port[0] = 21 [ 3496.066465][T15013] IPVS: ftp: loaded support on port[0] = 21 [ 3497.778144][ T27] audit: type=1804 audit(1565117522.715:4229): pid=15010 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1953/memory.events" dev="sda1" ino=16488 res=1 [ 3497.824222][ T27] audit: type=1800 audit(1565117522.715:4230): pid=15010 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16488 res=0 [ 3497.852774][ T27] audit: type=1804 audit(1565117522.755:4231): pid=14985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1448/memory.events" dev="sda1" ino=17210 res=1 [ 3497.889263][ T27] audit: type=1800 audit(1565117522.755:4232): pid=14985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17210 res=0 [ 3497.911000][ T27] audit: type=1804 audit(1565117522.755:4233): pid=14989 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1448/memory.events" dev="sda1" ino=17210 res=1 18:52:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1700000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x48) [ 3500.457045][ T27] audit: type=1804 audit(1565117525.395:4234): pid=15015 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1448/memory.events" dev="sda1" ino=17210 res=1 18:52:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xa}, 0x16) 18:52:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 18:52:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x300]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x12c]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xe}, 0x16) 18:52:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) 18:52:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x500]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 18:52:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) [ 3500.836425][T15038] IPVS: ftp: loaded support on port[0] = 21 [ 3501.230549][T15060] IPVS: ftp: loaded support on port[0] = 21 [ 3503.184869][ T27] audit: type=1804 audit(1565117528.125:4236): pid=15058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1955/memory.events" dev="sda1" ino=16801 res=1 [ 3503.211198][ T27] audit: type=1804 audit(1565117528.125:4235): pid=15035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1449/memory.events" dev="sda1" ino=16529 res=1 [ 3503.237193][ T27] audit: type=1800 audit(1565117528.125:4237): pid=15035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16529 res=0 [ 3503.258490][ T27] audit: type=1800 audit(1565117528.125:4238): pid=15058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16801 res=0 [ 3505.890377][ T27] audit: type=1804 audit(1565117530.835:4239): pid=15064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1449/memory.events" dev="sda1" ino=16529 res=1 18:52:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1800000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x5b4]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3505.929265][ T27] audit: type=1804 audit(1565117530.835:4240): pid=15065 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1449/memory.events" dev="sda1" ino=16529 res=1 18:52:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x10}, 0x16) 18:52:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 18:52:10 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x48) 18:52:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xfffffffe) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100000000000000]}, 0x48) 18:52:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 18:52:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x300}, 0x16) [ 3506.245819][T15088] IPVS: ftp: loaded support on port[0] = 21 18:52:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x5b6]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 18:52:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300000000000000]}, 0x48) [ 3506.503794][T15099] IPVS: ftp: loaded support on port[0] = 21 [ 3508.628477][ T27] audit: type=1804 audit(1565117533.565:4241): pid=15096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1956/memory.events" dev="sda1" ino=16487 res=1 [ 3508.655468][ T27] audit: type=1804 audit(1565117533.565:4242): pid=15081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1450/memory.events" dev="sda1" ino=16933 res=1 [ 3508.682784][ T27] audit: type=1800 audit(1565117533.565:4243): pid=15096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16487 res=0 [ 3508.703337][ T27] audit: type=1800 audit(1565117533.565:4244): pid=15081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16933 res=0 [ 3509.974763][ T27] audit: type=1804 audit(1565117534.915:4245): pid=15115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1450/memory.events" dev="sda1" ino=16933 res=1 [ 3509.999915][ T27] audit: type=1804 audit(1565117534.915:4246): pid=15117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1450/memory.events" dev="sda1" ino=16933 res=1 18:52:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1900000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x48) 18:52:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xa00}, 0x16) 18:52:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, 0x48) 18:52:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x600]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 18:52:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x48) 18:52:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0x48) 18:52:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xe00}, 0x16) 18:52:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x700]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xfffffffb) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x48) [ 3511.935427][T15151] IPVS: ftp: loaded support on port[0] = 21 [ 3512.180799][T15163] IPVS: ftp: loaded support on port[0] = 21 [ 3513.970501][ T27] audit: type=1804 audit(1565117538.915:4247): pid=15148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1451/memory.events" dev="sda1" ino=16929 res=1 [ 3514.006568][ T27] audit: type=1804 audit(1565117538.915:4248): pid=15160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1958/memory.events" dev="sda1" ino=17105 res=1 [ 3514.033520][ T27] audit: type=1800 audit(1565117538.915:4249): pid=15160 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17105 res=0 [ 3514.054242][ T27] audit: type=1800 audit(1565117538.915:4250): pid=15148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16929 res=0 [ 3516.662265][ T27] audit: type=1804 audit(1565117541.605:4251): pid=15167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1451/memory.events" dev="sda1" ino=16929 res=1 [ 3516.689965][ T27] audit: type=1804 audit(1565117541.635:4252): pid=15169 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1451/memory.events" dev="sda1" ino=16929 res=1 18:52:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 18:52:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x2000}, 0x16) 18:52:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x900]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0x48) 18:52:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1a00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0xfffffff6) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x4000}, 0x16) 18:52:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xa00]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 18:52:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300]}, 0x48) [ 3517.143402][T15188] IPVS: ftp: loaded support on port[0] = 21 18:52:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xff00}, 0x16) [ 3517.259770][T15201] IPVS: ftp: loaded support on port[0] = 21 18:52:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xe00]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202000000000000]}, 0x48) 18:52:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, 0x48) 18:52:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x200000}, 0x16) 18:52:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x48) [ 3519.377419][ T27] audit: type=1804 audit(1565117544.315:4253): pid=15187 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1959/memory.events" dev="sda1" ino=16929 res=1 [ 3519.410822][ T27] audit: type=1800 audit(1565117544.315:4254): pid=15187 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16929 res=0 [ 3519.431757][ T27] audit: type=1804 audit(1565117544.325:4255): pid=15195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1452/memory.events" dev="sda1" ino=17229 res=1 [ 3519.458097][ T27] audit: type=1800 audit(1565117544.325:4256): pid=15195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17229 res=0 [ 3522.075352][ T27] audit: type=1804 audit(1565117547.015:4257): pid=15201 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1452/memory.events" dev="sda1" ino=17229 res=1 [ 3522.101010][ T27] audit: type=1804 audit(1565117547.015:4258): pid=15205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1452/memory.events" dev="sda1" ino=17229 res=1 18:52:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1b00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100000000000000]}, 0x48) 18:52:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x1000000}, 0x16) 18:52:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x2000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 18:52:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1a00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) [ 3522.435535][T15247] IPVS: ftp: loaded support on port[0] = 21 18:52:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x2c01]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x2000000}, 0x16) 18:52:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300000000000000]}, 0x48) 18:52:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5202]}, 0x48) 18:52:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x3000000}, 0x16) [ 3522.837206][T15270] IPVS: ftp: loaded support on port[0] = 21 [ 3524.874910][ T27] audit: type=1804 audit(1565117549.815:4259): pid=15240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1453/memory.events" dev="sda1" ino=17228 res=1 [ 3524.942126][ T27] audit: type=1800 audit(1565117549.815:4260): pid=15240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17228 res=0 [ 3524.962795][ T27] audit: type=1804 audit(1565117549.855:4261): pid=15268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1960/memory.events" dev="sda1" ino=16929 res=1 [ 3524.988617][ T27] audit: type=1800 audit(1565117549.855:4262): pid=15268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16929 res=0 [ 3527.257618][ T27] audit: type=1804 audit(1565117552.195:4263): pid=15282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1453/memory.events" dev="sda1" ino=17228 res=1 [ 3527.282890][ T27] audit: type=1804 audit(1565117552.195:4264): pid=15284 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1453/memory.events" dev="sda1" ino=17228 res=1 18:52:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1c00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x3200]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100000000000000]}, 0x48) 18:52:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8000000}, 0x16) 18:52:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6100]}, 0x48) 18:52:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1b00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xa000000}, 0x16) 18:52:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300000000000000]}, 0x48) 18:52:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300]}, 0x48) 18:52:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x3f00]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3528.130302][T15308] IPVS: ftp: loaded support on port[0] = 21 18:52:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xe000000}, 0x16) 18:52:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff00000000]}, 0x48) [ 3528.281818][T15320] IPVS: ftp: loaded support on port[0] = 21 [ 3530.340169][ T27] audit: type=1804 audit(1565117555.285:4265): pid=15304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1454/memory.events" dev="sda1" ino=16929 res=1 [ 3530.366197][ T27] audit: type=1800 audit(1565117555.285:4266): pid=15304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16929 res=0 [ 3530.388066][ T27] audit: type=1804 audit(1565117555.305:4267): pid=15318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1961/memory.events" dev="sda1" ino=17186 res=1 [ 3530.414212][ T27] audit: type=1800 audit(1565117555.305:4268): pid=15318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17186 res=0 [ 3531.700132][ T27] audit: type=1804 audit(1565117556.645:4269): pid=15334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1454/memory.events" dev="sda1" ino=16929 res=1 [ 3531.725322][ T27] audit: type=1804 audit(1565117556.645:4270): pid=15336 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1454/memory.events" dev="sda1" ino=16929 res=1 18:52:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1c10030000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100]}, 0x48) 18:52:38 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x4000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x10000000}, 0x16) 18:52:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9cffffff00000000]}, 0x48) 18:52:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1c00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x40000000}, 0x16) 18:52:38 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7300]}, 0x48) 18:52:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fffffff00000000]}, 0x48) 18:52:38 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x6000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3533.475832][T15362] IPVS: ftp: loaded support on port[0] = 21 18:52:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xff000000}, 0x16) 18:52:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9b6080000000000]}, 0x48) [ 3533.592922][T15371] IPVS: ftp: loaded support on port[0] = 21 [ 3535.750686][ T27] audit: type=1804 audit(1565117560.695:4271): pid=15357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1455/memory.events" dev="sda1" ino=16487 res=1 [ 3535.783283][ T27] audit: type=1800 audit(1565117560.695:4272): pid=15357 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16487 res=0 [ 3535.804499][ T27] audit: type=1804 audit(1565117560.705:4273): pid=15365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1962/memory.events" dev="sda1" ino=16561 res=1 [ 3535.830485][ T27] audit: type=1800 audit(1565117560.705:4274): pid=15365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16561 res=0 [ 3538.145986][ T27] audit: type=1804 audit(1565117563.085:4275): pid=15386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1455/memory.events" dev="sda1" ino=16487 res=1 [ 3538.171351][ T27] audit: type=1804 audit(1565117563.085:4276): pid=15388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1455/memory.events" dev="sda1" ino=16487 res=1 18:52:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x80fe]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fff]}, 0x48) 18:52:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x1000000000000}, 0x16) 18:52:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1d00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcec3080000000000]}, 0x48) 18:52:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000180)="c4", &(0x7f00000001c0)=""/213}, 0x18) 18:52:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x48) 18:52:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 18:52:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x20000000000000}, 0x16) 18:52:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x51e, 0x2, 0x0, 0x800e00517) shutdown(r0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xfffffe75, 0x1004007e, 0x0, 0x800e0050e) shutdown(r1, 0x0) [ 3538.833737][T15414] IPVS: ftp: loaded support on port[0] = 21 18:52:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 18:52:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x100000000000000}, 0x16) 18:52:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xb405]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:43 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f]}, 0x48) 18:52:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @empty}}, 0xffffffffffffffc0}, 0x90) [ 3539.800696][ T27] audit: type=1804 audit(1565117564.745:4277): pid=15405 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1456/memory.events" dev="sda1" ino=16561 res=1 18:52:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1e00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3541.611056][ T27] audit: type=1800 audit(1565117566.555:4278): pid=15405 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16561 res=0 18:52:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000a00)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f00000000c0)=0x60, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) 18:52:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x200000000000000}, 0x16) 18:52:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9f000000000000]}, 0x48) 18:52:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9aa0c]}, 0x48) 18:52:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xb605]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x300000000000000}, 0x16) 18:52:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffc8ffffffffff]}, 0x48) 18:52:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9998]}, 0x48) 18:52:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x800000000000000}, 0x16) 18:52:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 18:52:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xc0fe]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3542.001309][T15475] IPVS: ftp: loaded support on port[0] = 21 [ 3542.966550][ T27] audit: type=1804 audit(1565117567.905:4279): pid=15470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1457/memory.events" dev="sda1" ino=16539 res=1 [ 3542.992581][ T27] audit: type=1800 audit(1565117567.905:4280): pid=15470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16539 res=0 [ 3544.303820][ T27] audit: type=1804 audit(1565117569.245:4281): pid=15491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1457/memory.events" dev="sda1" ino=16539 res=1 [ 3544.329192][ T27] audit: type=1804 audit(1565117569.245:4282): pid=15496 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1457/memory.events" dev="sda1" ino=16539 res=1 18:52:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x1f00000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x0, 0x81, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x156, 0x0, 0x0, 0x800e003be) shutdown(r0, 0x0) 18:52:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0x48) 18:52:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xa00000000000000}, 0x16) 18:52:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffc8ffff]}, 0x48) 18:52:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xfc00]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000]}, 0x48) 18:52:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xe00000000000000}, 0x16) 18:52:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 18:52:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xfe80]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3544.626203][T15521] IPVS: ftp: loaded support on port[0] = 21 18:52:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) 18:52:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x344000]}, 0x48) [ 3545.658101][ T27] audit: type=1804 audit(1565117570.595:4283): pid=15516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1458/memory.events" dev="sda1" ino=17233 res=1 [ 3545.704844][ T27] audit: type=1800 audit(1565117570.595:4284): pid=15516 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17233 res=0 [ 3547.008156][ T27] audit: type=1804 audit(1565117571.945:4285): pid=15526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1458/memory.events" dev="sda1" ino=17233 res=1 [ 3547.033534][ T27] audit: type=1804 audit(1565117571.945:4286): pid=15544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1458/memory.events" dev="sda1" ino=17233 res=1 18:52:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2000000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 18:52:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x1000000000000000}, 0x16) 18:52:52 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00'], 0x1) 18:52:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000]}, 0x48) 18:52:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xfec0]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403400]}, 0x48) 18:52:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x4000000000000000}, 0x16) 18:52:52 executing program 0: 18:52:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 18:52:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xff00]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:52 executing program 0: [ 3547.555088][T15568] IPVS: ftp: loaded support on port[0] = 21 [ 3548.348049][ T27] audit: type=1804 audit(1565117573.285:4287): pid=15564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1459/memory.events" dev="sda1" ino=17272 res=1 [ 3548.396365][ T27] audit: type=1800 audit(1565117573.285:4288): pid=15564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17272 res=0 [ 3549.689831][ T27] audit: type=1804 audit(1565117574.635:4289): pid=15587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1459/memory.events" dev="sda1" ino=17272 res=1 [ 3549.715078][ T27] audit: type=1804 audit(1565117574.635:4290): pid=15588 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1459/memory.events" dev="sda1" ino=17272 res=1 18:52:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2100000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000]}, 0x48) 18:52:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xff00000000000000}, 0x16) 18:52:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 18:52:54 executing program 0: 18:52:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x100000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:54 executing program 0: 18:52:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0xffffffff00000000}, 0x16) 18:52:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 18:52:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}, 0x48) [ 3550.024914][T15611] IPVS: ftp: loaded support on port[0] = 21 18:52:55 executing program 0: 18:52:55 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x1000000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3551.023546][ T27] audit: type=1804 audit(1565117575.965:4291): pid=15604 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1460/memory.events" dev="sda1" ino=16537 res=1 [ 3551.049605][ T27] audit: type=1800 audit(1565117575.965:4292): pid=15604 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16537 res=0 [ 3552.366049][ T27] audit: type=1804 audit(1565117577.305:4293): pid=15629 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1460/memory.events" dev="sda1" ino=16537 res=1 [ 3552.391656][ T27] audit: type=1804 audit(1565117577.305:4294): pid=15630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1460/memory.events" dev="sda1" ino=16537 res=1 18:52:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2200000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:52:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 18:52:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x2]}, 0x16) 18:52:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 18:52:57 executing program 0: 18:52:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x2000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x8) 18:52:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x3]}, 0x16) 18:52:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 18:52:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x3000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:52:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 18:52:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={r1}, &(0x7f0000000080)=0x8) [ 3552.870544][T15657] IPVS: ftp: loaded support on port[0] = 21 [ 3553.833909][ T27] audit: type=1804 audit(1565117578.775:4295): pid=15653 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1461/memory.events" dev="sda1" ino=17289 res=1 [ 3553.859887][ T27] audit: type=1800 audit(1565117578.775:4296): pid=15653 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17289 res=0 [ 3555.176159][ T27] audit: type=1804 audit(1565117580.115:4297): pid=15675 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1461/memory.events" dev="sda1" ino=17289 res=1 [ 3555.201648][ T27] audit: type=1804 audit(1565117580.115:4298): pid=15676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1461/memory.events" dev="sda1" ino=17289 res=1 18:53:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2300000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:53:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 18:53:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x8]}, 0x16) 18:53:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 18:53:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x4000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x200000000003, 0xb) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x2}, 0x20) 18:53:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x48) 18:53:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r1, @in6={{0xa, 0x0, 0x0, @empty}}, 0x88}, 0x90) 18:53:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0xa]}, 0x16) 18:53:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 18:53:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x5000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0xe]}, 0x16) [ 3555.717282][T15712] IPVS: ftp: loaded support on port[0] = 21 [ 3556.521784][ T27] audit: type=1804 audit(1565117581.465:4299): pid=15696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1462/memory.events" dev="sda1" ino=16534 res=1 [ 3556.547674][ T27] audit: type=1800 audit(1565117581.465:4300): pid=15696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16534 res=0 [ 3557.867376][ T27] audit: type=1804 audit(1565117582.805:4301): pid=15722 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1462/memory.events" dev="sda1" ino=16534 res=1 [ 3557.892808][ T27] audit: type=1804 audit(1565117582.805:4302): pid=15723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1462/memory.events" dev="sda1" ino=16534 res=1 18:53:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2400000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:53:02 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x6000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) 18:53:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x3c) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000180)}, 0x10) 18:53:02 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 18:53:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x10]}, 0x16) 18:53:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 18:53:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x300]}, 0x16) 18:53:03 executing program 0: r0 = socket(0x10, 0x200000000080003, 0x0) write(r0, &(0x7f0000000080)="1f00000010007ffffd3f00c007110000f30500030b00060000b67aca310000", 0x1f) 18:53:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 18:53:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x7000000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3558.297391][T15747] IPVS: ftp: loaded support on port[0] = 21 18:53:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0xa00]}, 0x16) [ 3559.207035][ T27] audit: type=1804 audit(1565117584.145:4303): pid=15741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1463/memory.events" dev="sda1" ino=17305 res=1 [ 3559.232933][ T27] audit: type=1800 audit(1565117584.145:4304): pid=15741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=17305 res=0 [ 3560.545761][ T27] audit: type=1804 audit(1565117585.485:4305): pid=15768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1463/memory.events" dev="sda1" ino=17305 res=1 18:53:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2500000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3560.571998][ T27] audit: type=1804 audit(1565117585.485:4306): pid=15769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1463/memory.events" dev="sda1" ino=17305 res=1 18:53:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x48) 18:53:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2300000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:53:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 18:53:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x8000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0xe00]}, 0x16) 18:53:05 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21]}, 0x48) 18:53:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x48) 18:53:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x2000]}, 0x16) 18:53:05 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x9000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x4000]}, 0x16) 18:53:05 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) [ 3561.007916][T15797] IPVS: ftp: loaded support on port[0] = 21 [ 3561.029562][T15798] IPVS: ftp: loaded support on port[0] = 21 [ 3563.408072][ T27] audit: type=1804 audit(1565117588.335:4307): pid=15791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1982/memory.events" dev="sda1" ino=17307 res=1 [ 3563.477375][ T27] audit: type=1804 audit(1565117588.335:4308): pid=15796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1464/memory.events" dev="sda1" ino=16515 res=1 [ 3563.504062][ T27] audit: type=1800 audit(1565117588.345:4309): pid=15791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=17307 res=0 [ 3563.525244][ T27] audit: type=1800 audit(1565117588.345:4310): pid=15796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16515 res=0 [ 3566.104692][ T27] audit: type=1804 audit(1565117591.045:4311): pid=15813 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1464/memory.events" dev="sda1" ino=16515 res=1 18:53:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xa000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23]}, 0x48) 18:53:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0xff00]}, 0x16) 18:53:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcaa0900]}, 0x48) 18:53:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2600000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3566.131444][ T27] audit: type=1804 audit(1565117591.045:4312): pid=15814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1464/memory.events" dev="sda1" ino=16515 res=1 18:53:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x5000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x200000]}, 0x16) 18:53:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x48) 18:53:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, 0x48) 18:53:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2200000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:53:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0xe000000]}, 0x4}]}, &(0x7f0000000040)=0x10) [ 3566.523271][T15840] IPVS: ftp: loaded support on port[0] = 21 18:53:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x1000000]}, 0x16) 18:53:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 18:53:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x48) 18:53:11 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x10000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x2000000]}, 0x16) [ 3566.904915][T15864] IPVS: ftp: loaded support on port[0] = 21 [ 3568.776844][ T27] audit: type=1804 audit(1565117593.715:4313): pid=15837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1465/memory.events" dev="sda1" ino=16669 res=1 [ 3568.820013][ T27] audit: type=1804 audit(1565117593.715:4314): pid=15860 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1984/memory.events" dev="sda1" ino=16639 res=1 [ 3568.846265][ T27] audit: type=1800 audit(1565117593.715:4315): pid=15837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16669 res=0 [ 3568.866785][ T27] audit: type=1800 audit(1565117593.755:4316): pid=15860 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16639 res=0 [ 3571.266775][ T27] audit: type=1804 audit(1565117596.205:4317): pid=15878 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1465/memory.events" dev="sda1" ino=16669 res=1 [ 3571.292300][ T27] audit: type=1804 audit(1565117596.205:4318): pid=15880 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1465/memory.events" dev="sda1" ino=16669 res=1 18:53:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2700000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:53:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x20000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 18:53:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}, 0x48) 18:53:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x3000000]}, 0x16) 18:53:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2600000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:53:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x48) 18:53:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x8000000]}, 0x16) 18:53:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63]}, 0x48) 18:53:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x2c010000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0x48) 18:53:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0xa000000]}, 0x16) [ 3571.970479][T15913] IPVS: ftp: loaded support on port[0] = 21 [ 3572.120888][T15917] IPVS: ftp: loaded support on port[0] = 21 [ 3574.145752][ T27] audit: type=1804 audit(1565117599.085:4319): pid=15910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1466/memory.events" dev="sda1" ino=16558 res=1 [ 3574.172108][ T27] audit: type=1800 audit(1565117599.085:4320): pid=15910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16558 res=0 [ 3574.192656][ T27] audit: type=1804 audit(1565117599.085:4321): pid=15914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1985/memory.events" dev="sda1" ino=16633 res=1 [ 3574.218946][ T27] audit: type=1800 audit(1565117599.085:4322): pid=15914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16633 res=0 [ 3576.847231][ T27] audit: type=1804 audit(1565117601.785:4323): pid=15929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1466/memory.events" dev="sda1" ino=16558 res=1 [ 3576.873129][ T27] audit: type=1804 audit(1565117601.785:4324): pid=15931 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1466/memory.events" dev="sda1" ino=16558 res=1 18:53:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x32000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71]}, 0x48) 18:53:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000]}, 0x48) 18:53:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2800000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:53:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0xe000000]}, 0x16) 18:53:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000]}, 0x48) 18:53:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x10000000]}, 0x16) 18:53:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73]}, 0x48) 18:53:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x3f000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2700000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:53:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x40000000]}, 0x16) [ 3577.271971][T15958] IPVS: ftp: loaded support on port[0] = 21 18:53:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x252]}, 0x48) 18:53:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x48) 18:53:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x40000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0xff000000]}, 0x16) [ 3577.602895][T15976] IPVS: ftp: loaded support on port[0] = 21 [ 3579.199059][T15809] BUG: MAX_STACK_TRACE_ENTRIES too low! [ 3579.204624][T15809] turning off the locking correctness validator. [ 3579.210991][T15809] CPU: 1 PID: 15809 Comm: kworker/u4:0 Not tainted 5.2.0+ #97 [ 3579.218432][T15809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3579.228495][T15809] Workqueue: netns cleanup_net [ 3579.233275][T15809] Call Trace: [ 3579.236566][T15809] dump_stack+0x172/0x1f0 [ 3579.240884][T15809] save_trace.isra.0.cold+0x14/0x19 [ 3579.246066][T15809] mark_lock+0x3db/0x11e0 [ 3579.250385][T15809] ? __kasan_check_read+0x11/0x20 [ 3579.255423][T15809] __lock_acquire+0x1380/0x4c30 [ 3579.260286][T15809] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3579.265554][T15809] ? debug_object_active_state+0x28a/0x350 [ 3579.271381][T15809] ? mark_held_locks+0xf0/0xf0 [ 3579.276141][T15809] lock_acquire+0x190/0x410 [ 3579.280648][T15809] ? flush_workqueue+0xf7/0x14b0 [ 3579.285584][T15809] flush_workqueue+0x126/0x14b0 [ 3579.290443][T15809] ? flush_workqueue+0xf7/0x14b0 [ 3579.295368][T15809] ? lock_downgrade+0x920/0x920 [ 3579.300201][T15809] ? __call_rcu.constprop.0+0x2ae/0x740 [ 3579.305729][T15809] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 3579.311608][T15809] ? call_rcu+0xb/0x10 [ 3579.315659][T15809] ? destroy_inode+0x141/0x1c0 [ 3579.320403][T15809] drain_workqueue+0x1b4/0x470 [ 3579.325151][T15809] ? drain_workqueue+0x1b4/0x470 [ 3579.330067][T15809] destroy_workqueue+0x21/0x6c0 [ 3579.334896][T15809] ? __sock_release+0x19f/0x280 [ 3579.339724][T15809] tipc_topsrv_exit_net+0x3fe/0x5d8 [ 3579.344918][T15809] ? tipc_topsrv_init_net+0xb90/0xb90 [ 3579.350273][T15809] ops_exit_list.isra.0+0xaa/0x150 [ 3579.355360][T15809] cleanup_net+0x4e2/0xa70 [ 3579.359754][T15809] ? netns_install+0x1d0/0x1d0 [ 3579.364502][T15809] process_one_work+0x9af/0x1740 [ 3579.369434][T15809] ? pwq_dec_nr_in_flight+0x320/0x320 [ 3579.374800][T15809] ? lock_acquire+0x190/0x410 [ 3579.379463][T15809] worker_thread+0x98/0xe40 [ 3579.383949][T15809] ? trace_hardirqs_on+0x67/0x240 [ 3579.388953][T15809] kthread+0x361/0x430 [ 3579.393001][T15809] ? process_one_work+0x1740/0x1740 [ 3579.398178][T15809] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 3579.404395][T15809] ret_from_fork+0x24/0x30 [ 3579.563961][ T27] audit: type=1804 audit(1565117604.505:4325): pid=15948 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1467/memory.events" dev="sda1" ino=16634 res=1 [ 3579.591618][ T27] audit: type=1804 audit(1565117604.505:4326): pid=15972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1986/memory.events" dev="sda1" ino=16667 res=1 [ 3579.617512][ T27] audit: type=1800 audit(1565117604.505:4327): pid=15948 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16634 res=0 [ 3579.637996][ T27] audit: type=1800 audit(1565117604.505:4328): pid=15972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16667 res=0 [ 3579.789448][T15809] kobject: 'rx-0' (0000000089512ed1): kobject_cleanup, parent 00000000e9185049 [ 3579.798465][T15809] kobject: 'rx-0' (0000000089512ed1): auto cleanup 'remove' event [ 3579.806261][T15809] kobject: 'rx-0' (0000000089512ed1): kobject_uevent_env [ 3579.813307][T15809] kobject: 'rx-0' (0000000089512ed1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3579.824270][T15809] kobject: 'rx-0' (0000000089512ed1): auto cleanup kobject_del [ 3579.831883][T15809] kobject: 'rx-0' (0000000089512ed1): calling ktype release [ 3579.839387][T15809] kobject: 'rx-0': free name [ 3579.844000][T15809] kobject: 'tx-0' (00000000141c4cf0): kobject_cleanup, parent 00000000e9185049 [ 3579.852952][T15809] kobject: 'tx-0' (00000000141c4cf0): auto cleanup 'remove' event [ 3579.860800][T15809] kobject: 'tx-0' (00000000141c4cf0): kobject_uevent_env [ 3579.867846][T15809] kobject: 'tx-0' (00000000141c4cf0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3579.878624][T15809] kobject: 'tx-0' (00000000141c4cf0): auto cleanup kobject_del [ 3579.886197][T15809] kobject: 'tx-0' (00000000141c4cf0): calling ktype release [ 3579.893491][T15809] kobject: 'tx-0': free name [ 3579.898117][T15809] kobject: 'queues' (00000000e9185049): kobject_cleanup, parent 00000000dd563f29 [ 3579.907213][T15809] kobject: 'queues' (00000000e9185049): calling ktype release [ 3579.914702][T15809] kobject: 'queues' (00000000e9185049): kset_release [ 3579.921398][T15809] kobject: 'queues': free name [ 3579.926385][T15809] kobject: 'ip6gre0' (000000000c15e98b): kobject_uevent_env [ 3579.933689][T15809] kobject: 'ip6gre0' (000000000c15e98b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3579.945873][T15809] kobject: 'rx-0' (00000000852f7570): kobject_cleanup, parent 00000000ec84eb8f [ 3579.955152][T15809] kobject: 'rx-0' (00000000852f7570): auto cleanup 'remove' event [ 3579.963013][T15809] kobject: 'rx-0' (00000000852f7570): kobject_uevent_env [ 3579.970090][T15809] kobject: 'rx-0' (00000000852f7570): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3579.980883][T15809] kobject: 'rx-0' (00000000852f7570): auto cleanup kobject_del [ 3579.988489][T15809] kobject: 'rx-0' (00000000852f7570): calling ktype release [ 3579.995762][T15809] kobject: 'rx-0': free name [ 3580.000410][T15809] kobject: 'tx-0' (000000004202b91d): kobject_cleanup, parent 00000000ec84eb8f [ 3580.009393][T15809] kobject: 'tx-0' (000000004202b91d): auto cleanup 'remove' event [ 3580.017183][T15809] kobject: 'tx-0' (000000004202b91d): kobject_uevent_env [ 3580.024223][T15809] kobject: 'tx-0' (000000004202b91d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.034991][T15809] kobject: 'tx-0' (000000004202b91d): auto cleanup kobject_del [ 3580.042603][T15809] kobject: 'tx-0' (000000004202b91d): calling ktype release [ 3580.049901][T15809] kobject: 'tx-0': free name [ 3580.054485][T15809] kobject: 'queues' (00000000ec84eb8f): kobject_cleanup, parent 00000000dd563f29 [ 3580.063603][T15809] kobject: 'queues' (00000000ec84eb8f): calling ktype release [ 3580.071092][T15809] kobject: 'queues' (00000000ec84eb8f): kset_release [ 3580.078349][T15809] kobject: 'queues': free name [ 3580.083347][T15809] kobject: 'ip6gre0' (00000000f41ec8dd): kobject_uevent_env [ 3580.090740][T15809] kobject: 'ip6gre0' (00000000f41ec8dd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.138043][T15809] kobject: 'ip6gre0' (000000000c15e98b): kobject_cleanup, parent 00000000dd563f29 [ 3580.147307][T15809] kobject: 'ip6gre0' (000000000c15e98b): calling ktype release [ 3580.156465][T15809] kobject: 'ip6gre0': free name [ 3580.161590][T15809] kobject: 'ip6gre0' (00000000f41ec8dd): kobject_cleanup, parent 00000000dd563f29 [ 3580.172446][T15809] kobject: 'ip6gre0' (00000000f41ec8dd): calling ktype release [ 3580.180084][T15809] kobject: 'ip6gre0': free name [ 3580.185910][T15809] kobject: 'rx-0' (000000006d92d92f): kobject_cleanup, parent 000000004bdc6726 [ 3580.194966][T15809] kobject: 'rx-0' (000000006d92d92f): auto cleanup 'remove' event [ 3580.202837][T15809] kobject: 'rx-0' (000000006d92d92f): kobject_uevent_env [ 3580.209900][T15809] kobject: 'rx-0' (000000006d92d92f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.220725][T15809] kobject: 'rx-0' (000000006d92d92f): auto cleanup kobject_del [ 3580.228448][T15809] kobject: 'rx-0' (000000006d92d92f): calling ktype release [ 3580.236146][T15809] kobject: 'rx-0': free name [ 3580.240841][T15809] kobject: 'tx-0' (00000000e324f983): kobject_cleanup, parent 000000004bdc6726 [ 3580.250018][T15809] kobject: 'tx-0' (00000000e324f983): auto cleanup 'remove' event [ 3580.257819][T15809] kobject: 'tx-0' (00000000e324f983): kobject_uevent_env [ 3580.264998][T15809] kobject: 'tx-0' (00000000e324f983): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.275790][T15809] kobject: 'tx-0' (00000000e324f983): auto cleanup kobject_del [ 3580.283425][T15809] kobject: 'tx-0' (00000000e324f983): calling ktype release [ 3580.290845][T15809] kobject: 'tx-0': free name [ 3580.295464][T15809] kobject: 'queues' (000000004bdc6726): kobject_cleanup, parent 00000000dd563f29 [ 3580.304652][T15809] kobject: 'queues' (000000004bdc6726): calling ktype release [ 3580.312165][T15809] kobject: 'queues' (000000004bdc6726): kset_release [ 3580.319032][T15809] kobject: 'queues': free name [ 3580.324005][T15809] kobject: 'ip6tnl0' (00000000f5b87f0e): kobject_uevent_env [ 3580.331579][T15809] kobject: 'ip6tnl0' (00000000f5b87f0e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.343462][T15809] kobject: 'rx-0' (00000000c1b99289): kobject_cleanup, parent 000000000b542545 [ 3580.352429][T15809] kobject: 'rx-0' (00000000c1b99289): auto cleanup 'remove' event [ 3580.360400][T15809] kobject: 'rx-0' (00000000c1b99289): kobject_uevent_env [ 3580.367504][T15809] kobject: 'rx-0' (00000000c1b99289): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.378343][T15809] kobject: 'rx-0' (00000000c1b99289): auto cleanup kobject_del [ 3580.385925][T15809] kobject: 'rx-0' (00000000c1b99289): calling ktype release [ 3580.393250][T15809] kobject: 'rx-0': free name [ 3580.397866][T15809] kobject: 'tx-0' (000000007c8120b4): kobject_cleanup, parent 000000000b542545 [ 3580.406955][T15809] kobject: 'tx-0' (000000007c8120b4): auto cleanup 'remove' event [ 3580.414876][T15809] kobject: 'tx-0' (000000007c8120b4): kobject_uevent_env [ 3580.421976][T15809] kobject: 'tx-0' (000000007c8120b4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.432926][T15809] kobject: 'tx-0' (000000007c8120b4): auto cleanup kobject_del [ 3580.440632][T15809] kobject: 'tx-0' (000000007c8120b4): calling ktype release [ 3580.447913][T15809] kobject: 'tx-0': free name [ 3580.452748][T15809] kobject: 'queues' (000000000b542545): kobject_cleanup, parent 00000000dd563f29 [ 3580.462041][T15809] kobject: 'queues' (000000000b542545): calling ktype release [ 3580.469581][T15809] kobject: 'queues' (000000000b542545): kset_release [ 3580.476260][T15809] kobject: 'queues': free name [ 3580.481402][T15809] kobject: 'ip6tnl0' (0000000060cad07b): kobject_uevent_env [ 3580.489846][T15809] kobject: 'ip6tnl0' (0000000060cad07b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.528061][T15809] kobject: 'ip6tnl0' (00000000f5b87f0e): kobject_cleanup, parent 00000000dd563f29 [ 3580.537295][T15809] kobject: 'ip6tnl0' (00000000f5b87f0e): calling ktype release [ 3580.546371][T15809] kobject: 'ip6tnl0': free name [ 3580.551317][T15809] kobject: 'ip6tnl0' (0000000060cad07b): kobject_cleanup, parent 00000000dd563f29 [ 3580.560576][T15809] kobject: 'ip6tnl0' (0000000060cad07b): calling ktype release [ 3580.568285][T15809] kobject: 'ip6tnl0': free name [ 3580.574045][T15809] kobject: 'rx-0' (0000000029cbe19e): kobject_cleanup, parent 000000002ad33129 [ 3580.583077][T15809] kobject: 'rx-0' (0000000029cbe19e): auto cleanup 'remove' event [ 3580.590925][T15809] kobject: 'rx-0' (0000000029cbe19e): kobject_uevent_env [ 3580.598030][T15809] kobject: 'rx-0' (0000000029cbe19e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.608937][T15809] kobject: 'rx-0' (0000000029cbe19e): auto cleanup kobject_del [ 3580.616605][T15809] kobject: 'rx-0' (0000000029cbe19e): calling ktype release [ 3580.624003][T15809] kobject: 'rx-0': free name [ 3580.628665][T15809] kobject: 'tx-0' (0000000065734b79): kobject_cleanup, parent 000000002ad33129 [ 3580.637586][T15809] kobject: 'tx-0' (0000000065734b79): auto cleanup 'remove' event [ 3580.645493][T15809] kobject: 'tx-0' (0000000065734b79): kobject_uevent_env [ 3580.652705][T15809] kobject: 'tx-0' (0000000065734b79): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.663635][T15809] kobject: 'tx-0' (0000000065734b79): auto cleanup kobject_del [ 3580.671474][T15809] kobject: 'tx-0' (0000000065734b79): calling ktype release [ 3580.678819][T15809] kobject: 'tx-0': free name [ 3580.683427][T15809] kobject: 'queues' (000000002ad33129): kobject_cleanup, parent 00000000dd563f29 [ 3580.692714][T15809] kobject: 'queues' (000000002ad33129): calling ktype release [ 3580.700299][T15809] kobject: 'queues' (000000002ad33129): kset_release [ 3580.706982][T15809] kobject: 'queues': free name [ 3580.712107][T15809] kobject: 'sit0' (00000000192ad779): kobject_uevent_env [ 3580.719197][T15809] kobject: 'sit0' (00000000192ad779): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.731104][T15809] kobject: 'rx-0' (000000001c3ce605): kobject_cleanup, parent 00000000784a69d1 [ 3580.740255][T15809] kobject: 'rx-0' (000000001c3ce605): auto cleanup 'remove' event [ 3580.748244][T15809] kobject: 'rx-0' (000000001c3ce605): kobject_uevent_env [ 3580.755283][T15809] kobject: 'rx-0' (000000001c3ce605): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.766257][T15809] kobject: 'rx-0' (000000001c3ce605): auto cleanup kobject_del [ 3580.773898][T15809] kobject: 'rx-0' (000000001c3ce605): calling ktype release [ 3580.781260][T15809] kobject: 'rx-0': free name [ 3580.785909][T15809] kobject: 'tx-0' (0000000012d0a6de): kobject_cleanup, parent 00000000784a69d1 [ 3580.794881][T15809] kobject: 'tx-0' (0000000012d0a6de): auto cleanup 'remove' event [ 3580.802984][T15809] kobject: 'tx-0' (0000000012d0a6de): kobject_uevent_env [ 3580.810085][T15809] kobject: 'tx-0' (0000000012d0a6de): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.820966][T15809] kobject: 'tx-0' (0000000012d0a6de): auto cleanup kobject_del [ 3580.828892][T15809] kobject: 'tx-0' (0000000012d0a6de): calling ktype release [ 3580.836770][T15809] kobject: 'tx-0': free name [ 3580.841533][T15809] kobject: 'queues' (00000000784a69d1): kobject_cleanup, parent 00000000dd563f29 [ 3580.850752][T15809] kobject: 'queues' (00000000784a69d1): calling ktype release [ 3580.858276][T15809] kobject: 'queues' (00000000784a69d1): kset_release [ 3580.864952][T15809] kobject: 'queues': free name [ 3580.870089][T15809] kobject: 'sit0' (000000009bffc248): kobject_uevent_env [ 3580.877220][T15809] kobject: 'sit0' (000000009bffc248): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3580.938175][T15809] kobject: 'sit0' (00000000192ad779): kobject_cleanup, parent 00000000dd563f29 [ 3580.947150][T15809] kobject: 'sit0' (00000000192ad779): calling ktype release [ 3580.954554][T15809] kobject: 'sit0': free name [ 3580.959280][T15809] kobject: 'sit0' (000000009bffc248): kobject_cleanup, parent 00000000dd563f29 [ 3580.968297][T15809] kobject: 'sit0' (000000009bffc248): calling ktype release [ 3580.975637][T15809] kobject: 'sit0': free name [ 3580.981428][T15809] kobject: 'rx-0' (000000002afd1079): kobject_cleanup, parent 00000000c492ae2e [ 3580.990669][T15809] kobject: 'rx-0' (000000002afd1079): auto cleanup 'remove' event [ 3580.998537][T15809] kobject: 'rx-0' (000000002afd1079): kobject_uevent_env [ 3581.005559][T15809] kobject: 'rx-0' (000000002afd1079): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.016411][T15809] kobject: 'rx-0' (000000002afd1079): auto cleanup kobject_del [ 3581.024015][T15809] kobject: 'rx-0' (000000002afd1079): calling ktype release [ 3581.031337][T15809] kobject: 'rx-0': free name [ 3581.035994][T15809] kobject: 'tx-0' (000000002eb71200): kobject_cleanup, parent 00000000c492ae2e [ 3581.044991][T15809] kobject: 'tx-0' (000000002eb71200): auto cleanup 'remove' event [ 3581.053733][T15809] kobject: 'tx-0' (000000002eb71200): kobject_uevent_env [ 3581.060819][T15809] kobject: 'tx-0' (000000002eb71200): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.071674][T15809] kobject: 'tx-0' (000000002eb71200): auto cleanup kobject_del [ 3581.079306][T15809] kobject: 'tx-0' (000000002eb71200): calling ktype release [ 3581.086607][T15809] kobject: 'tx-0': free name [ 3581.091312][T15809] kobject: 'queues' (00000000c492ae2e): kobject_cleanup, parent 00000000dd563f29 [ 3581.100453][T15809] kobject: 'queues' (00000000c492ae2e): calling ktype release [ 3581.107932][T15809] kobject: 'queues' (00000000c492ae2e): kset_release [ 3581.114749][T15809] kobject: 'queues': free name [ 3581.120734][T15809] kobject: 'ip6_vti0' (000000003ef5685b): kobject_uevent_env [ 3581.128255][T15809] kobject: 'ip6_vti0' (000000003ef5685b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.140457][T15809] kobject: 'rx-0' (0000000095f3d0e7): kobject_cleanup, parent 00000000d1f4d8a5 [ 3581.149457][T15809] kobject: 'rx-0' (0000000095f3d0e7): auto cleanup 'remove' event [ 3581.157282][T15809] kobject: 'rx-0' (0000000095f3d0e7): kobject_uevent_env [ 3581.164363][T15809] kobject: 'rx-0' (0000000095f3d0e7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.175188][T15809] kobject: 'rx-0' (0000000095f3d0e7): auto cleanup kobject_del [ 3581.182838][T15809] kobject: 'rx-0' (0000000095f3d0e7): calling ktype release [ 3581.190134][T15809] kobject: 'rx-0': free name [ 3581.194726][T15809] kobject: 'tx-0' (000000002199b0ee): kobject_cleanup, parent 00000000d1f4d8a5 [ 3581.203719][T15809] kobject: 'tx-0' (000000002199b0ee): auto cleanup 'remove' event [ 3581.211594][T15809] kobject: 'tx-0' (000000002199b0ee): kobject_uevent_env [ 3581.218690][T15809] kobject: 'tx-0' (000000002199b0ee): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.229486][T15809] kobject: 'tx-0' (000000002199b0ee): auto cleanup kobject_del [ 3581.237064][T15809] kobject: 'tx-0' (000000002199b0ee): calling ktype release [ 3581.244407][T15809] kobject: 'tx-0': free name [ 3581.249247][T15809] kobject: 'queues' (00000000d1f4d8a5): kobject_cleanup, parent 00000000dd563f29 [ 3581.258420][T15809] kobject: 'queues' (00000000d1f4d8a5): calling ktype release [ 3581.265867][T15809] kobject: 'queues' (00000000d1f4d8a5): kset_release [ 3581.272592][T15809] kobject: 'queues': free name [ 3581.277590][T15809] kobject: 'ip6_vti0' (000000007b3c521b): kobject_uevent_env [ 3581.284998][T15809] kobject: 'ip6_vti0' (000000007b3c521b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.338158][T15809] kobject: 'ip6_vti0' (000000003ef5685b): kobject_cleanup, parent 00000000dd563f29 [ 3581.347531][T15809] kobject: 'ip6_vti0' (000000003ef5685b): calling ktype release [ 3581.355287][T15809] kobject: 'ip6_vti0': free name [ 3581.360287][T15809] kobject: 'ip6_vti0' (000000007b3c521b): kobject_cleanup, parent 00000000dd563f29 [ 3581.369704][T15809] kobject: 'ip6_vti0' (000000007b3c521b): calling ktype release [ 3581.377339][T15809] kobject: 'ip6_vti0': free name [ 3581.383265][T15809] kobject: 'rx-0' (000000008ea99a69): kobject_cleanup, parent 0000000001fdd9f2 [ 3581.392258][T15809] kobject: 'rx-0' (000000008ea99a69): auto cleanup 'remove' event [ 3581.400144][T15809] kobject: 'rx-0' (000000008ea99a69): kobject_uevent_env [ 3581.407233][T15809] kobject: 'rx-0' (000000008ea99a69): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.418069][T15809] kobject: 'rx-0' (000000008ea99a69): auto cleanup kobject_del [ 3581.425731][T15809] kobject: 'rx-0' (000000008ea99a69): calling ktype release [ 3581.433172][T15809] kobject: 'rx-0': free name [ 3581.437800][T15809] kobject: 'tx-0' (0000000023b1108c): kobject_cleanup, parent 0000000001fdd9f2 [ 3581.446922][T15809] kobject: 'tx-0' (0000000023b1108c): auto cleanup 'remove' event [ 3581.454845][T15809] kobject: 'tx-0' (0000000023b1108c): kobject_uevent_env [ 3581.461938][T15809] kobject: 'tx-0' (0000000023b1108c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.472830][T15809] kobject: 'tx-0' (0000000023b1108c): auto cleanup kobject_del [ 3581.480470][T15809] kobject: 'tx-0' (0000000023b1108c): calling ktype release [ 3581.487819][T15809] kobject: 'tx-0': free name [ 3581.492469][T15809] kobject: 'queues' (0000000001fdd9f2): kobject_cleanup, parent 00000000dd563f29 [ 3581.501669][T15809] kobject: 'queues' (0000000001fdd9f2): calling ktype release [ 3581.509289][T15809] kobject: 'queues' (0000000001fdd9f2): kset_release [ 3581.515977][T15809] kobject: 'queues': free name [ 3581.521093][T15809] kobject: 'ip_vti0' (00000000d225b082): kobject_uevent_env [ 3581.528590][T15809] kobject: 'ip_vti0' (00000000d225b082): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.540353][T15809] kobject: 'rx-0' (00000000da5ef280): kobject_cleanup, parent 00000000a4371369 [ 3581.549426][T15809] kobject: 'rx-0' (00000000da5ef280): auto cleanup 'remove' event [ 3581.557223][T15809] kobject: 'rx-0' (00000000da5ef280): kobject_uevent_env [ 3581.564358][T15809] kobject: 'rx-0' (00000000da5ef280): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.575235][T15809] kobject: 'rx-0' (00000000da5ef280): auto cleanup kobject_del [ 3581.582906][T15809] kobject: 'rx-0' (00000000da5ef280): calling ktype release [ 3581.590307][T15809] kobject: 'rx-0': free name [ 3581.594921][T15809] kobject: 'tx-0' (000000004f9e245c): kobject_cleanup, parent 00000000a4371369 [ 3581.603917][T15809] kobject: 'tx-0' (000000004f9e245c): auto cleanup 'remove' event [ 3581.611816][T15809] kobject: 'tx-0' (000000004f9e245c): kobject_uevent_env [ 3581.618893][T15809] kobject: 'tx-0' (000000004f9e245c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.629676][T15809] kobject: 'tx-0' (000000004f9e245c): auto cleanup kobject_del [ 3581.637324][T15809] kobject: 'tx-0' (000000004f9e245c): calling ktype release [ 3581.644699][T15809] kobject: 'tx-0': free name [ 3581.649342][T15809] kobject: 'queues' (00000000a4371369): kobject_cleanup, parent 00000000dd563f29 [ 3581.658635][T15809] kobject: 'queues' (00000000a4371369): calling ktype release [ 3581.666096][T15809] kobject: 'queues' (00000000a4371369): kset_release [ 3581.672924][T15809] kobject: 'queues': free name [ 3581.678620][T15809] kobject: 'ip_vti0' (000000002662e077): kobject_uevent_env [ 3581.685914][T15809] kobject: 'ip_vti0' (000000002662e077): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.738199][T15809] kobject: 'ip_vti0' (00000000d225b082): kobject_cleanup, parent 00000000dd563f29 [ 3581.747429][T15809] kobject: 'ip_vti0' (00000000d225b082): calling ktype release [ 3581.755402][T15809] kobject: 'ip_vti0': free name [ 3581.760359][T15809] kobject: 'ip_vti0' (000000002662e077): kobject_cleanup, parent 00000000dd563f29 [ 3581.769637][T15809] kobject: 'ip_vti0' (000000002662e077): calling ktype release [ 3581.777187][T15809] kobject: 'ip_vti0': free name [ 3581.782947][T15809] kobject: 'batman_adv' (00000000396c2050): kobject_uevent_env [ 3581.790527][T15809] kobject: 'batman_adv' (00000000396c2050): kobject_uevent_env: filter function caused the event to drop! [ 3581.802235][T15809] kobject: 'batman_adv' (00000000396c2050): kobject_cleanup, parent 00000000dd563f29 [ 3581.811859][T15809] kobject: 'batman_adv' (00000000396c2050): calling ktype release [ 3581.819716][T15809] kobject: (00000000396c2050): dynamic_kobj_release [ 3581.826286][T15809] kobject: 'batman_adv': free name [ 3581.831646][T15809] kobject: 'rx-0' (00000000497ab210): kobject_cleanup, parent 000000005a9c5dbd [ 3581.840624][T15809] kobject: 'rx-0' (00000000497ab210): auto cleanup 'remove' event [ 3581.848450][T15809] kobject: 'rx-0' (00000000497ab210): kobject_uevent_env [ 3581.856130][T15809] kobject: 'rx-0' (00000000497ab210): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.867324][T15809] kobject: 'rx-0' (00000000497ab210): auto cleanup kobject_del [ 3581.874952][T15809] kobject: 'rx-0' (00000000497ab210): calling ktype release [ 3581.882390][T15809] kobject: 'rx-0': free name [ 3581.887003][T15809] kobject: 'tx-0' (000000006d151916): kobject_cleanup, parent 000000005a9c5dbd [ 3581.895958][T15809] kobject: 'tx-0' (000000006d151916): auto cleanup 'remove' event [ 3581.903785][T15809] kobject: 'tx-0' (000000006d151916): kobject_uevent_env [ 3581.910851][T15809] kobject: 'tx-0' (000000006d151916): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.921647][T15809] kobject: 'tx-0' (000000006d151916): auto cleanup kobject_del [ 3581.929443][T15809] kobject: 'tx-0' (000000006d151916): calling ktype release [ 3581.936713][T15809] kobject: 'tx-0': free name [ 3581.941378][T15809] kobject: 'queues' (000000005a9c5dbd): kobject_cleanup, parent 00000000dd563f29 [ 3581.950972][T15809] kobject: 'queues' (000000005a9c5dbd): calling ktype release [ 3581.958503][T15809] kobject: 'queues' (000000005a9c5dbd): kset_release [ 3581.965173][T15809] kobject: 'queues': free name [ 3581.970269][T15809] kobject: 'erspan0' (000000001f5e78ea): kobject_uevent_env [ 3581.977535][T15809] kobject: 'erspan0' (000000001f5e78ea): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3581.989286][T15809] kobject: 'batman_adv' (00000000523f8f0d): kobject_uevent_env [ 3581.996913][T15809] kobject: 'batman_adv' (00000000523f8f0d): kobject_uevent_env: filter function caused the event to drop! [ 3582.008591][T15809] kobject: 'batman_adv' (00000000523f8f0d): kobject_cleanup, parent 00000000dd563f29 [ 3582.018144][T15809] kobject: 'batman_adv' (00000000523f8f0d): calling ktype release [ 3582.025952][T15809] kobject: (00000000523f8f0d): dynamic_kobj_release [ 3582.032593][T15809] kobject: 'batman_adv': free name [ 3582.037875][T15809] kobject: 'rx-0' (00000000af5510cb): kobject_cleanup, parent 00000000bd104138 [ 3582.046930][T15809] kobject: 'rx-0' (00000000af5510cb): auto cleanup 'remove' event [ 3582.054754][T15809] kobject: 'rx-0' (00000000af5510cb): kobject_uevent_env [ 3582.061816][T15809] kobject: 'rx-0' (00000000af5510cb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3582.072630][T15809] kobject: 'rx-0' (00000000af5510cb): auto cleanup kobject_del [ 3582.080502][T15809] kobject: 'rx-0' (00000000af5510cb): calling ktype release [ 3582.087789][T15809] kobject: 'rx-0': free name [ 3582.092478][T15809] kobject: 'tx-0' (00000000887e2562): kobject_cleanup, parent 00000000bd104138 [ 3582.101657][T15809] kobject: 'tx-0' (00000000887e2562): auto cleanup 'remove' event [ 3582.109542][T15809] kobject: 'tx-0' (00000000887e2562): kobject_uevent_env [ 3582.116568][T15809] kobject: 'tx-0' (00000000887e2562): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3582.127595][T15809] kobject: 'tx-0' (00000000887e2562): auto cleanup kobject_del [ 3582.135247][T15809] kobject: 'tx-0' (00000000887e2562): calling ktype release [ 3582.142546][T15809] kobject: 'tx-0': free name [ 3582.147142][T15809] kobject: 'queues' (00000000bd104138): kobject_cleanup, parent 00000000dd563f29 [ 3582.156294][T15809] kobject: 'queues' (00000000bd104138): calling ktype release [ 3582.163781][T15809] kobject: 'queues' (00000000bd104138): kset_release [ 3582.170501][T15809] kobject: 'queues': free name [ 3582.175518][T15809] kobject: 'erspan0' (000000004825aee7): kobject_uevent_env [ 3582.182815][T15809] kobject: 'erspan0' (000000004825aee7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3582.238174][T15809] kobject: 'erspan0' (000000001f5e78ea): kobject_cleanup, parent 00000000dd563f29 [ 3582.246626][ T27] audit: type=1804 audit(1565117607.185:4329): pid=15990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1467/memory.events" dev="sda1" ino=16634 res=1 [ 3582.247435][T15809] kobject: 'erspan0' (000000001f5e78ea): calling ktype release [ 3582.276757][ T27] audit: type=1804 audit(1565117607.185:4330): pid=15992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1467/memory.events" dev="sda1" ino=16634 res=1 [ 3582.280290][T15809] kobject: 'erspan0': free name [ 3582.310691][T15809] kobject: 'erspan0' (000000004825aee7): kobject_cleanup, parent 00000000dd563f29 [ 3582.319986][T15809] kobject: 'erspan0' (000000004825aee7): calling ktype release [ 3582.327553][T15809] kobject: 'erspan0': free name [ 3582.334198][T15809] kobject: 'batman_adv' (00000000651c7444): kobject_uevent_env [ 3582.348383][T15809] kobject: 'batman_adv' (00000000651c7444): kobject_uevent_env: filter function caused the event to drop! [ 3582.378291][T15809] kobject: 'batman_adv' (00000000651c7444): kobject_cleanup, parent 00000000dd563f29 18:53:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2900000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) 18:53:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 18:53:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x1000000000000]}, 0x16) 18:53:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 18:53:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x60000000]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x2700000000000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x4e21, 0x3ff, 0x4e24, 0x8, 0xa, 0x80, 0xa0, 0xb6, r3, r4}, {0x1, 0x0, 0x400, 0x27a, 0x7, 0x3, 0x3, 0x4}, {0x6, 0x10001, 0xc96, 0x125}, 0x5, 0x6e6bba, 0x1, 0x1, 0x3, 0x1}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@remote, 0x3500, 0x3, 0x0, 0x1, 0x5, 0x4b3, 0x20}}, 0xe8) socket$inet6_udp(0xa, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$binfmt_script(r1, 0x0, 0x0) [ 3582.388051][T15809] kobject: 'batman_adv' (00000000651c7444): calling ktype release [ 3582.389044][ T3900] kobject: 'loop0' (0000000002befbee): kobject_uevent_env [ 3582.395873][T15809] kobject: (00000000651c7444): dynamic_kobj_release [ 3582.408883][ T3900] kobject: 'loop0' (0000000002befbee): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 3582.420657][T15809] kobject: 'batman_adv': free name [ 3582.425996][T15809] kobject: 'rx-0' (00000000e5dbaffd): kobject_cleanup, parent 000000006986c32b [ 3582.474191][T15809] kobject: 'rx-0' (00000000e5dbaffd): auto cleanup 'remove' event [ 3582.494383][T15809] kobject: 'rx-0' (00000000e5dbaffd): kobject_uevent_env [ 3582.500020][ T3900] kobject: 'loop5' (00000000a48af28b): kobject_uevent_env 18:53:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x20000000000000]}, 0x16) 18:53:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) [ 3582.520594][T15809] kobject: 'rx-0' (00000000e5dbaffd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3582.551093][ T3900] kobject: 'loop5' (00000000a48af28b): fill_kobj_path: path = '/devices/virtual/block/loop5' 18:53:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x8dffffff]}, 0x4}]}, &(0x7f0000000040)=0x10) 18:53:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) [ 3582.569646][T15809] kobject: 'rx-0' (00000000e5dbaffd): auto cleanup kobject_del [ 3582.586090][T15809] kobject: 'rx-0' (00000000e5dbaffd): calling ktype release 18:53:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x100000000000000]}, 0x16) [ 3582.628167][T15809] kobject: 'rx-0': free name [ 3582.629537][ T3900] kobject: 'loop4' (0000000044e41f0c): kobject_uevent_env [ 3582.632849][T15809] kobject: 'tx-0' (00000000818d4014): kobject_cleanup, parent 000000006986c32b [ 3582.653719][T16016] kobject: 'nfs_client' (000000001c3b3a39): kobject_add_internal: parent: 'net', set: 'nfs' [ 3582.666426][ T3900] kobject: 'loop4' (0000000044e41f0c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3582.711965][ T3900] kobject: 'loop2' (00000000576ec524): kobject_uevent_env [ 3582.720836][T15809] kobject: 'tx-0' (00000000818d4014): auto cleanup 'remove' event [ 3582.724553][T16021] kobject: 'nfs_client' (00000000a6d6a6ee): kobject_add_internal: parent: 'net', set: 'nfs' [ 3582.744502][ T3900] kobject: 'loop2' (00000000576ec524): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3582.761979][T15809] kobject: 'tx-0' (00000000818d4014): kobject_uevent_env [ 3582.766483][T16016] kobject: 'nfs_client' (000000001c3b3a39): kobject_uevent_env [ 3582.779103][ T3900] kobject: 'loop3' (00000000e23dcd26): kobject_uevent_env [ 3582.790899][T16016] kobject: 'nfs_client' (000000001c3b3a39): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 3582.801659][T16021] kobject: 'nfs_client' (00000000a6d6a6ee): kobject_uevent_env 18:53:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x44}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) [ 3582.808157][T15809] kobject: 'tx-0' (00000000818d4014): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3582.809905][ T3900] kobject: 'loop3' (00000000e23dcd26): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3582.842953][T16021] kobject: 'nfs_client' (00000000a6d6a6ee): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 3582.867107][T15809] kobject: 'tx-0' (00000000818d4014): auto cleanup kobject_del [ 3582.876804][ T3900] kobject: 'loop1' (00000000b952afa5): kobject_uevent_env [ 3582.887082][T16016] IPVS: ftp: loaded support on port[0] = 21 [ 3582.896493][ T3900] kobject: 'loop1' (00000000b952afa5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3582.908661][T15809] kobject: 'tx-0' (00000000818d4014): calling ktype release [ 3582.915997][T15809] kobject: 'tx-0': free name [ 3582.920028][T16021] IPVS: ftp: loaded support on port[0] = 21 [ 3582.948012][T15809] kobject: 'queues' (000000006986c32b): kobject_cleanup, parent 00000000dd563f29 [ 3582.956447][ T3900] kobject: 'loop2' (00000000576ec524): kobject_uevent_env [ 3582.957254][T15809] kobject: 'queues' (000000006986c32b): calling ktype release [ 3582.988340][T15809] kobject: 'queues' (000000006986c32b): kset_release [ 3582.995113][T15809] kobject: 'queues': free name [ 3582.999970][ T3900] kobject: 'loop2' (00000000576ec524): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3583.001396][ T3900] kobject: 'loop3' (00000000e23dcd26): kobject_uevent_env [ 3583.028770][T15809] kobject: 'gretap0' (00000000b93c3ce6): kobject_uevent_env [ 3583.046509][ T3900] kobject: 'loop3' (00000000e23dcd26): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3583.048039][T15809] kobject: 'gretap0' (00000000b93c3ce6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3583.073564][ T3900] kobject: 'loop1' (00000000b952afa5): kobject_uevent_env [ 3583.079289][T15809] kobject: 'batman_adv' (00000000dd68d801): kobject_uevent_env [ 3583.092652][ T3900] kobject: 'loop1' (00000000b952afa5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3583.098417][T15809] kobject: 'batman_adv' (00000000dd68d801): kobject_uevent_env: filter function caused the event to drop! [ 3583.117009][ T3900] kobject: 'loop2' (00000000576ec524): kobject_uevent_env [ 3583.131308][T15809] kobject: 'batman_adv' (00000000dd68d801): kobject_cleanup, parent 00000000dd563f29 [ 3583.133267][ T3900] kobject: 'loop2' (00000000576ec524): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3583.151006][T15809] kobject: 'batman_adv' (00000000dd68d801): calling ktype release [ 3583.170895][T15809] kobject: (00000000dd68d801): dynamic_kobj_release [ 3583.177142][ T3900] kobject: 'loop4' (0000000044e41f0c): kobject_uevent_env [ 3583.188045][T15809] kobject: 'batman_adv': free name [ 3583.190681][ T3900] kobject: 'loop4' (0000000044e41f0c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3583.193452][T15809] kobject: 'rx-0' (000000000067751f): kobject_cleanup, parent 0000000021737672 [ 3583.264788][T15809] kobject: 'rx-0' (000000000067751f): auto cleanup 'remove' event [ 3583.274489][T15809] kobject: 'rx-0' (000000000067751f): kobject_uevent_env [ 3583.282012][T15809] kobject: 'rx-0' (000000000067751f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3583.297731][T15809] kobject: 'rx-0' (000000000067751f): auto cleanup kobject_del [ 3583.315321][T15809] kobject: 'rx-0' (000000000067751f): calling ktype release [ 3583.325819][T15809] kobject: 'rx-0': free name [ 3583.331580][T15809] kobject: 'tx-0' (000000000c9281d8): kobject_cleanup, parent 0000000021737672 [ 3583.350138][T15809] kobject: 'tx-0' (000000000c9281d8): auto cleanup 'remove' event [ 3583.361656][T15809] kobject: 'tx-0' (000000000c9281d8): kobject_uevent_env [ 3583.369556][T15809] kobject: 'tx-0' (000000000c9281d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3583.383576][T15809] kobject: 'tx-0' (000000000c9281d8): auto cleanup kobject_del [ 3583.392048][T15809] kobject: 'tx-0' (000000000c9281d8): calling ktype release [ 3583.402333][T15809] kobject: 'tx-0': free name [ 3583.407257][T15809] kobject: 'queues' (0000000021737672): kobject_cleanup, parent 00000000dd563f29 [ 3583.418002][T15809] kobject: 'queues' (0000000021737672): calling ktype release [ 3583.434230][T15809] kobject: 'queues' (0000000021737672): kset_release [ 3583.442538][T15809] kobject: 'queues': free name [ 3583.447723][T15809] kobject: 'gretap0' (0000000030e270c0): kobject_uevent_env [ 3583.455892][T15809] kobject: 'gretap0' (0000000030e270c0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3583.467523][T16021] kobject: 'lo' (000000007728cff5): kobject_add_internal: parent: 'net', set: 'devices' [ 3583.479153][T16021] kobject: 'lo' (000000007728cff5): kobject_uevent_env [ 3583.486302][T16021] kobject: 'lo' (000000007728cff5): fill_kobj_path: path = '/devices/virtual/net/lo' [ 3583.496652][T16021] kobject: 'queues' (000000003a77fa69): kobject_add_internal: parent: 'lo', set: '' [ 3583.506810][T16021] kobject: 'queues' (000000003a77fa69): kobject_uevent_env [ 3583.514126][T16021] kobject: 'queues' (000000003a77fa69): kobject_uevent_env: filter function caused the event to drop! [ 3583.525273][T16021] kobject: 'rx-0' (00000000b11196a1): kobject_add_internal: parent: 'queues', set: 'queues' [ 3583.536408][T16021] kobject: 'rx-0' (00000000b11196a1): kobject_uevent_env [ 3583.543814][T16021] kobject: 'rx-0' (00000000b11196a1): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 3583.554810][T16021] kobject: 'tx-0' (0000000050cd286a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3583.565081][T16021] kobject: 'tx-0' (0000000050cd286a): kobject_uevent_env [ 3583.572185][T16021] kobject: 'tx-0' (0000000050cd286a): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 3583.584319][T15809] kobject: 'gretap0' (00000000b93c3ce6): kobject_cleanup, parent 00000000dd563f29 [ 3583.593608][T15809] kobject: 'gretap0' (00000000b93c3ce6): calling ktype release [ 3583.601828][T15809] kobject: 'gretap0': free name [ 3583.619070][T16021] kobject: 'tunl0' (000000003e79df22): kobject_add_internal: parent: 'net', set: 'devices' [ 3583.634186][T16021] kobject: 'tunl0' (000000003e79df22): kobject_uevent_env [ 3583.641649][T16021] kobject: 'tunl0' (000000003e79df22): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 3583.654983][T16021] kobject: 'queues' (0000000062974f32): kobject_add_internal: parent: 'tunl0', set: '' [ 3583.665348][T16021] kobject: 'queues' (0000000062974f32): kobject_uevent_env [ 3583.675631][T16021] kobject: 'queues' (0000000062974f32): kobject_uevent_env: filter function caused the event to drop! [ 3583.686893][T16021] kobject: 'rx-0' (00000000f2df6a8a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3583.701071][T16021] kobject: 'rx-0' (00000000f2df6a8a): kobject_uevent_env [ 3583.708734][T16021] kobject: 'rx-0' (00000000f2df6a8a): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 3583.722213][T16021] kobject: 'tx-0' (0000000064004c10): kobject_add_internal: parent: 'queues', set: 'queues' [ 3583.733939][T16021] kobject: 'tx-0' (0000000064004c10): kobject_uevent_env [ 3583.743716][T16021] kobject: 'tx-0' (0000000064004c10): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 3583.756254][T15809] kobject: 'gretap0' (0000000030e270c0): kobject_cleanup, parent 00000000dd563f29 [ 3583.769183][T16021] kobject: 'gre0' (00000000b0968657): kobject_add_internal: parent: 'net', set: 'devices' [ 3583.781559][T15809] kobject: 'gretap0' (0000000030e270c0): calling ktype release [ 3583.790496][T15809] kobject: 'gretap0': free name [ 3583.796262][T16021] kobject: 'gre0' (00000000b0968657): kobject_uevent_env [ 3583.805721][T16021] kobject: 'gre0' (00000000b0968657): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 3583.817147][T16021] kobject: 'queues' (000000005d1fd601): kobject_add_internal: parent: 'gre0', set: '' [ 3583.828107][T16021] kobject: 'queues' (000000005d1fd601): kobject_uevent_env [ 3583.835863][T16021] kobject: 'queues' (000000005d1fd601): kobject_uevent_env: filter function caused the event to drop! [ 3583.847565][T16021] kobject: 'rx-0' (00000000a310f22c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3583.858477][T16021] kobject: 'rx-0' (00000000a310f22c): kobject_uevent_env [ 3583.865661][T16021] kobject: 'rx-0' (00000000a310f22c): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 3583.877500][T16021] kobject: 'tx-0' (000000005a7cc9f3): kobject_add_internal: parent: 'queues', set: 'queues' [ 3583.888247][T16021] kobject: 'tx-0' (000000005a7cc9f3): kobject_uevent_env [ 3583.897333][T16021] kobject: 'tx-0' (000000005a7cc9f3): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 3583.909715][T16021] kobject: 'gretap0' (000000008c8092a5): kobject_add_internal: parent: 'net', set: 'devices' [ 3583.921337][T16021] kobject: 'gretap0' (000000008c8092a5): kobject_uevent_env [ 3583.929193][T16021] kobject: 'gretap0' (000000008c8092a5): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 3583.940310][T16021] kobject: 'queues' (0000000022df38a7): kobject_add_internal: parent: 'gretap0', set: '' [ 3583.952676][T16021] kobject: 'queues' (0000000022df38a7): kobject_uevent_env [ 3583.960778][T16021] kobject: 'queues' (0000000022df38a7): kobject_uevent_env: filter function caused the event to drop! [ 3583.972296][T16021] kobject: 'rx-0' (000000006eb34709): kobject_add_internal: parent: 'queues', set: 'queues' [ 3583.983126][T16021] kobject: 'rx-0' (000000006eb34709): kobject_uevent_env [ 3583.990635][T16021] kobject: 'rx-0' (000000006eb34709): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 3584.002458][T16021] kobject: 'tx-0' (00000000a2e0fec2): kobject_add_internal: parent: 'queues', set: 'queues' [ 3584.013555][T16021] kobject: 'tx-0' (00000000a2e0fec2): kobject_uevent_env [ 3584.021006][T16021] kobject: 'tx-0' (00000000a2e0fec2): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 3584.033495][T16021] kobject: 'batman_adv' (0000000018dac273): kobject_add_internal: parent: 'gretap0', set: '' [ 3584.046128][T15809] kobject: 'rx-0' (000000005cd302b7): kobject_cleanup, parent 0000000034aad820 [ 3584.056632][T15809] kobject: 'rx-0' (000000005cd302b7): auto cleanup 'remove' event [ 3584.064727][T15809] kobject: 'rx-0' (000000005cd302b7): kobject_uevent_env [ 3584.071950][T15809] kobject: 'rx-0' (000000005cd302b7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3584.083020][T15809] kobject: 'rx-0' (000000005cd302b7): auto cleanup kobject_del [ 3584.090734][T15809] kobject: 'rx-0' (000000005cd302b7): calling ktype release [ 3584.098286][T15809] kobject: 'rx-0': free name [ 3584.102941][T15809] kobject: 'tx-0' (00000000576231a0): kobject_cleanup, parent 0000000034aad820 [ 3584.111985][T15809] kobject: 'tx-0' (00000000576231a0): auto cleanup 'remove' event [ 3584.120315][T15809] kobject: 'tx-0' (00000000576231a0): kobject_uevent_env [ 3584.127495][T15809] kobject: 'tx-0' (00000000576231a0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3584.138716][T15809] kobject: 'tx-0' (00000000576231a0): auto cleanup kobject_del [ 3584.146437][T15809] kobject: 'tx-0' (00000000576231a0): calling ktype release [ 3584.153780][T15809] kobject: 'tx-0': free name [ 3584.158430][T15809] kobject: 'queues' (0000000034aad820): kobject_cleanup, parent 00000000dd563f29 [ 3584.167624][T15809] kobject: 'queues' (0000000034aad820): calling ktype release [ 3584.175325][T15809] kobject: 'queues' (0000000034aad820): kset_release [ 3584.182043][T15809] kobject: 'queues': free name [ 3584.187051][T15809] kobject: 'gre0' (0000000086d2543e): kobject_uevent_env [ 3584.194261][T15809] kobject: 'gre0' (0000000086d2543e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3584.205951][T15809] kobject: 'rx-0' (0000000091a8283c): kobject_cleanup, parent 000000005e59b858 [ 3584.215413][T15809] kobject: 'rx-0' (0000000091a8283c): auto cleanup 'remove' event [ 3584.223488][T15809] kobject: 'rx-0' (0000000091a8283c): kobject_uevent_env [ 3584.230602][T15809] kobject: 'rx-0' (0000000091a8283c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3584.241778][T15809] kobject: 'rx-0' (0000000091a8283c): auto cleanup kobject_del [ 3584.249844][T15809] kobject: 'rx-0' (0000000091a8283c): calling ktype release [ 3584.258067][T15809] kobject: 'rx-0': free name [ 3584.262881][T15809] kobject: 'tx-0' (000000002715b5fe): kobject_cleanup, parent 000000005e59b858 [ 3584.272471][T15809] kobject: 'tx-0' (000000002715b5fe): auto cleanup 'remove' event [ 3584.280840][T15809] kobject: 'tx-0' (000000002715b5fe): kobject_uevent_env [ 3584.288055][T15809] kobject: 'tx-0' (000000002715b5fe): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3584.299374][T15809] kobject: 'tx-0' (000000002715b5fe): auto cleanup kobject_del [ 3584.307107][T15809] kobject: 'tx-0' (000000002715b5fe): calling ktype release [ 3584.314443][T15809] kobject: 'tx-0': free name [ 3584.319189][T15809] kobject: 'queues' (000000005e59b858): kobject_cleanup, parent 00000000dd563f29 [ 3584.328713][T15809] kobject: 'queues' (000000005e59b858): calling ktype release [ 3584.336294][T15809] kobject: 'queues' (000000005e59b858): kset_release [ 3584.343041][T15809] kobject: 'queues': free name [ 3584.348275][T15809] kobject: 'gre0' (00000000e5265f2e): kobject_uevent_env [ 3584.355322][T15809] kobject: 'gre0' (00000000e5265f2e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3584.367001][T16021] kobject: 'erspan0' (00000000e418edee): kobject_add_internal: parent: 'net', set: 'devices' [ 3584.379382][T16021] kobject: 'erspan0' (00000000e418edee): kobject_uevent_env [ 3584.387002][T16021] kobject: 'erspan0' (00000000e418edee): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 3584.397583][T16021] kobject: 'queues' (0000000032f2c5f4): kobject_add_internal: parent: 'erspan0', set: '' [ 3584.408966][T16021] kobject: 'queues' (0000000032f2c5f4): kobject_uevent_env [ 3584.416348][T16021] kobject: 'queues' (0000000032f2c5f4): kobject_uevent_env: filter function caused the event to drop! [ 3584.427687][T16021] kobject: 'rx-0' (0000000046aaaad4): kobject_add_internal: parent: 'queues', set: 'queues' [ 3584.438041][T16021] kobject: 'rx-0' (0000000046aaaad4): kobject_uevent_env [ 3584.445164][T16021] kobject: 'rx-0' (0000000046aaaad4): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 3584.456824][T16021] kobject: 'tx-0' (000000000d6e00ec): kobject_add_internal: parent: 'queues', set: 'queues' [ 3584.467185][T16021] kobject: 'tx-0' (000000000d6e00ec): kobject_uevent_env [ 3584.474379][T16021] kobject: 'tx-0' (000000000d6e00ec): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 3584.486585][T16021] kobject: 'batman_adv' (0000000069953668): kobject_add_internal: parent: 'erspan0', set: '' [ 3584.499208][T15809] kobject: 'gre0' (0000000086d2543e): kobject_cleanup, parent 00000000dd563f29 [ 3584.508871][T16021] kobject: 'ip_vti0' (000000002341263c): kobject_add_internal: parent: 'net', set: 'devices' [ 3584.513754][T15809] kobject: 'gre0' (0000000086d2543e): calling ktype release [ 3584.527311][T15809] kobject: 'gre0': free name [ 3584.528794][T16021] kobject: 'ip_vti0' (000000002341263c): kobject_uevent_env [ 3584.539563][T16021] kobject: 'ip_vti0' (000000002341263c): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 3584.550311][T16021] kobject: 'queues' (0000000016ed4251): kobject_add_internal: parent: 'ip_vti0', set: '' [ 3584.561394][T16021] kobject: 'queues' (0000000016ed4251): kobject_uevent_env [ 3584.568936][T16021] kobject: 'queues' (0000000016ed4251): kobject_uevent_env: filter function caused the event to drop! [ 3584.580327][T16021] kobject: 'rx-0' (00000000849c7dd1): kobject_add_internal: parent: 'queues', set: 'queues' [ 3584.591115][T16021] kobject: 'rx-0' (00000000849c7dd1): kobject_uevent_env [ 3584.598276][T16021] kobject: 'rx-0' (00000000849c7dd1): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 3584.609675][T16021] kobject: 'tx-0' (00000000f07507f5): kobject_add_internal: parent: 'queues', set: 'queues' [ 3584.620280][T16021] kobject: 'tx-0' (00000000f07507f5): kobject_uevent_env [ 3584.627504][T16021] kobject: 'tx-0' (00000000f07507f5): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 3584.640346][T15809] kobject: 'gre0' (00000000e5265f2e): kobject_cleanup, parent 00000000dd563f29 [ 3584.640569][T16021] kobject: 'ip6_vti0' (00000000c77e09d9): kobject_add_internal: parent: 'net', set: 'devices' [ 3584.659973][T15809] kobject: 'gre0' (00000000e5265f2e): calling ktype release [ 3584.661198][T16021] kobject: 'ip6_vti0' (00000000c77e09d9): kobject_uevent_env [ 3584.675000][T16021] kobject: 'ip6_vti0' (00000000c77e09d9): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 3584.675227][T15809] kobject: 'gre0': free name [ 3584.688916][T16021] kobject: 'queues' (00000000ce3ad15d): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 3584.701465][T16021] kobject: 'queues' (00000000ce3ad15d): kobject_uevent_env [ 3584.708895][T16021] kobject: 'queues' (00000000ce3ad15d): kobject_uevent_env: filter function caused the event to drop! [ 3584.720458][T16021] kobject: 'rx-0' (000000002a07ed13): kobject_add_internal: parent: 'queues', set: 'queues' [ 3584.731180][T16021] kobject: 'rx-0' (000000002a07ed13): kobject_uevent_env [ 3584.738427][T16021] kobject: 'rx-0' (000000002a07ed13): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 3584.750024][T16021] kobject: 'tx-0' (0000000070b75e25): kobject_add_internal: parent: 'queues', set: 'queues' [ 3584.760410][T16021] kobject: 'tx-0' (0000000070b75e25): kobject_uevent_env [ 3584.768601][T16021] kobject: 'tx-0' (0000000070b75e25): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 3584.781421][T16021] kobject: 'sit0' (00000000143c76e6): kobject_add_internal: parent: 'net', set: 'devices' [ 3584.792241][T16021] kobject: 'sit0' (00000000143c76e6): kobject_uevent_env [ 3584.799525][T16021] kobject: 'sit0' (00000000143c76e6): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 3584.809729][T16021] kobject: 'queues' (0000000092c0b2b1): kobject_add_internal: parent: 'sit0', set: '' [ 3584.820043][T16021] kobject: 'queues' (0000000092c0b2b1): kobject_uevent_env [ 3584.827392][T16021] kobject: 'queues' (0000000092c0b2b1): kobject_uevent_env: filter function caused the event to drop! [ 3584.839600][T16021] kobject: 'rx-0' (00000000e50ff263): kobject_add_internal: parent: 'queues', set: 'queues' [ 3584.849866][T16021] kobject: 'rx-0' (00000000e50ff263): kobject_uevent_env [ 3584.857060][T16021] kobject: 'rx-0' (00000000e50ff263): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 3584.868470][T16021] kobject: 'tx-0' (00000000e5875ccd): kobject_add_internal: parent: 'queues', set: 'queues' [ 3584.878821][T16021] kobject: 'tx-0' (00000000e5875ccd): kobject_uevent_env [ 3584.885951][T16021] kobject: 'tx-0' (00000000e5875ccd): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 3584.901132][T15809] kobject: 'rx-0' (0000000076beb9da): kobject_cleanup, parent 00000000c26e52f4 [ 3584.910487][T15809] kobject: 'rx-0' (0000000076beb9da): auto cleanup 'remove' event [ 3584.918892][T15809] kobject: 'rx-0' (0000000076beb9da): kobject_uevent_env [ 3584.926066][T15809] kobject: 'rx-0' (0000000076beb9da): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3584.937648][T15809] kobject: 'rx-0' (0000000076beb9da): auto cleanup kobject_del [ 3584.945536][T15809] kobject: 'rx-0' (0000000076beb9da): calling ktype release [ 3584.953086][T15809] kobject: 'rx-0': free name [ 3584.957899][T15809] kobject: 'tx-0' (0000000050347cf4): kobject_cleanup, parent 00000000c26e52f4 [ 3584.967083][T15809] kobject: 'tx-0' (0000000050347cf4): auto cleanup 'remove' event [ 3584.975326][T15809] kobject: 'tx-0' (0000000050347cf4): kobject_uevent_env [ 3584.982820][T15809] kobject: 'tx-0' (0000000050347cf4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3584.984062][ T27] audit: type=1804 audit(1565117609.935:4331): pid=16009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir508734772/syzkaller.kbd7oN/1987/memory.events" dev="sda1" ino=16629 res=1 [ 3585.006161][T15809] kobject: 'tx-0' (0000000050347cf4): auto cleanup kobject_del [ 3585.024017][ T27] audit: type=1800 audit(1565117609.935:4332): pid=16009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16629 res=0 [ 3585.027774][T15809] kobject: 'tx-0' (0000000050347cf4): calling ktype release [ 3585.056425][T15809] kobject: 'tx-0': free name [ 3585.061503][T15809] kobject: 'queues' (00000000c26e52f4): kobject_cleanup, parent 00000000dd563f29 [ 3585.070886][T15809] kobject: 'queues' (00000000c26e52f4): calling ktype release [ 3585.078603][T15809] kobject: 'queues' (00000000c26e52f4): kset_release [ 3585.085955][T15809] kobject: 'queues': free name [ 3585.091663][T15809] kobject: 'tunl0' (00000000a29df989): kobject_uevent_env [ 3585.098976][T15809] kobject: 'tunl0' (00000000a29df989): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.110728][T15809] kobject: 'rx-0' (000000006a1f235c): kobject_cleanup, parent 0000000060eb5079 [ 3585.120218][T15809] kobject: 'rx-0' (000000006a1f235c): auto cleanup 'remove' event [ 3585.128413][T15809] kobject: 'rx-0' (000000006a1f235c): kobject_uevent_env [ 3585.135462][T15809] kobject: 'rx-0' (000000006a1f235c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.146552][T15809] kobject: 'rx-0' (000000006a1f235c): auto cleanup kobject_del [ 3585.154416][T15809] kobject: 'rx-0' (000000006a1f235c): calling ktype release [ 3585.161866][T15809] kobject: 'rx-0': free name [ 3585.167500][T15809] kobject: 'tx-0' (000000003d6a86dc): kobject_cleanup, parent 0000000060eb5079 [ 3585.176972][T15809] kobject: 'tx-0' (000000003d6a86dc): auto cleanup 'remove' event [ 3585.184957][T15809] kobject: 'tx-0' (000000003d6a86dc): kobject_uevent_env [ 3585.192113][T15809] kobject: 'tx-0' (000000003d6a86dc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.203459][T15809] kobject: 'tx-0' (000000003d6a86dc): auto cleanup kobject_del [ 3585.211903][T15809] kobject: 'tx-0' (000000003d6a86dc): calling ktype release [ 3585.219433][T15809] kobject: 'tx-0': free name [ 3585.224085][T15809] kobject: 'queues' (0000000060eb5079): kobject_cleanup, parent 00000000dd563f29 [ 3585.233796][T15809] kobject: 'queues' (0000000060eb5079): calling ktype release [ 3585.241682][T15809] kobject: 'queues' (0000000060eb5079): kset_release [ 3585.248604][T15809] kobject: 'queues': free name [ 3585.253883][T15809] kobject: 'tunl0' (00000000abd11472): kobject_uevent_env [ 3585.261199][T15809] kobject: 'tunl0' (00000000abd11472): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.278767][T16021] kobject: 'rx-0' (00000000e50ff263): kobject_cleanup, parent 0000000092c0b2b1 [ 3585.288399][T16021] kobject: 'rx-0' (00000000e50ff263): auto cleanup 'remove' event [ 3585.296679][T16021] kobject: 'rx-0' (00000000e50ff263): kobject_uevent_env [ 3585.304059][T16021] kobject: 'rx-0' (00000000e50ff263): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 3585.315497][T16021] kobject: 'rx-0' (00000000e50ff263): auto cleanup kobject_del [ 3585.323533][T16021] kobject: 'rx-0' (00000000e50ff263): calling ktype release [ 3585.331476][T16021] kobject: 'rx-0': free name [ 3585.337800][T16021] kobject: 'tx-0' (00000000e5875ccd): kobject_cleanup, parent 0000000092c0b2b1 [ 3585.347008][T16021] kobject: 'tx-0' (00000000e5875ccd): auto cleanup 'remove' event [ 3585.355667][T16021] kobject: 'tx-0' (00000000e5875ccd): kobject_uevent_env [ 3585.364967][T16021] kobject: 'tx-0' (00000000e5875ccd): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 3585.376496][T16021] kobject: 'tx-0' (00000000e5875ccd): auto cleanup kobject_del [ 3585.384919][T16021] kobject: 'tx-0' (00000000e5875ccd): calling ktype release [ 3585.392866][T16021] kobject: 'tx-0': free name [ 3585.398002][T16021] kobject: 'queues' (0000000092c0b2b1): kobject_cleanup, parent 00000000dd563f29 [ 3585.407557][T16021] kobject: 'queues' (0000000092c0b2b1): calling ktype release [ 3585.415525][T16021] kobject: 'queues' (0000000092c0b2b1): kset_release [ 3585.422499][T16021] kobject: 'queues': free name [ 3585.427635][T16021] kobject: 'sit0' (00000000143c76e6): kobject_uevent_env [ 3585.435302][T16021] kobject: 'sit0' (00000000143c76e6): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 3585.445883][T15809] kobject: 'tunl0' (00000000a29df989): kobject_cleanup, parent 00000000dd563f29 [ 3585.455319][T15809] kobject: 'tunl0' (00000000a29df989): calling ktype release [ 3585.462953][T15809] kobject: 'tunl0': free name [ 3585.467834][T15809] kobject: 'tunl0' (00000000abd11472): kobject_cleanup, parent 00000000dd563f29 [ 3585.477299][T15809] kobject: 'tunl0' (00000000abd11472): calling ktype release [ 3585.484978][T15809] kobject: 'tunl0': free name [ 3585.491324][T15809] kobject: 'rx-0' (000000000545f97a): kobject_cleanup, parent 00000000af61f5a9 [ 3585.500693][T15809] kobject: 'rx-0' (000000000545f97a): auto cleanup 'remove' event [ 3585.508831][T15809] kobject: 'rx-0' (000000000545f97a): kobject_uevent_env [ 3585.516203][T15809] kobject: 'rx-0' (000000000545f97a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.527138][T15809] kobject: 'rx-0' (000000000545f97a): auto cleanup kobject_del [ 3585.535249][T15809] kobject: 'rx-0' (000000000545f97a): calling ktype release [ 3585.542872][T15809] kobject: 'rx-0': free name [ 3585.547695][T15809] kobject: 'tx-0' (0000000072ef691e): kobject_cleanup, parent 00000000af61f5a9 [ 3585.557009][T15809] kobject: 'tx-0' (0000000072ef691e): auto cleanup 'remove' event [ 3585.565394][T15809] kobject: 'tx-0' (0000000072ef691e): kobject_uevent_env [ 3585.572561][T15809] kobject: 'tx-0' (0000000072ef691e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.583571][T15809] kobject: 'tx-0' (0000000072ef691e): auto cleanup kobject_del [ 3585.591264][T15809] kobject: 'tx-0' (0000000072ef691e): calling ktype release [ 3585.598988][T15809] kobject: 'tx-0': free name [ 3585.603740][T15809] kobject: 'queues' (00000000af61f5a9): kobject_cleanup, parent 00000000dd563f29 [ 3585.613985][T15809] kobject: 'queues' (00000000af61f5a9): calling ktype release [ 3585.621856][T15809] kobject: 'queues' (00000000af61f5a9): kset_release [ 3585.629261][T15809] kobject: 'queues': free name [ 3585.634305][T15809] kobject: 'lo' (000000005f3f07d7): kobject_uevent_env [ 3585.641445][T15809] kobject: 'lo' (000000005f3f07d7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.653082][T15809] kobject: 'rx-0' (00000000858c2b09): kobject_cleanup, parent 00000000e1ff631e [ 3585.662288][T15809] kobject: 'rx-0' (00000000858c2b09): auto cleanup 'remove' event [ 3585.670292][T15809] kobject: 'rx-0' (00000000858c2b09): kobject_uevent_env [ 3585.677434][T15809] kobject: 'rx-0' (00000000858c2b09): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.688969][T15809] kobject: 'rx-0' (00000000858c2b09): auto cleanup kobject_del [ 3585.696780][T15809] kobject: 'rx-0' (00000000858c2b09): calling ktype release [ 3585.704302][T15809] kobject: 'rx-0': free name [ 3585.709228][T15809] kobject: 'tx-0' (00000000ee117a67): kobject_cleanup, parent 00000000e1ff631e [ 3585.718249][T15809] kobject: 'tx-0' (00000000ee117a67): auto cleanup 'remove' event [ 3585.726312][T15809] kobject: 'tx-0' (00000000ee117a67): kobject_uevent_env [ 3585.733775][T15809] kobject: 'tx-0' (00000000ee117a67): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.744849][T15809] kobject: 'tx-0' (00000000ee117a67): auto cleanup kobject_del [ 3585.752727][T15809] kobject: 'tx-0' (00000000ee117a67): calling ktype release [ 3585.760182][T15809] kobject: 'tx-0': free name [ 3585.764933][T15809] kobject: 'queues' (00000000e1ff631e): kobject_cleanup, parent 00000000dd563f29 [ 3585.774653][T15809] kobject: 'queues' (00000000e1ff631e): calling ktype release [ 3585.782389][T15809] kobject: 'queues' (00000000e1ff631e): kset_release [ 3585.789256][T15809] kobject: 'queues': free name [ 3585.794366][T15809] kobject: 'lo' (00000000ecf66d42): kobject_uevent_env [ 3585.801402][T15809] kobject: 'lo' (00000000ecf66d42): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3585.812592][T16021] kobject: 'sit0' (00000000143c76e6): kobject_cleanup, parent 00000000dd563f29 [ 3585.822007][T16021] kobject: 'sit0' (00000000143c76e6): calling ktype release [ 3585.830013][T16021] kobject: 'sit0': free name [ 3585.835719][T16021] kobject: 'rx-0' (000000002a07ed13): kobject_cleanup, parent 00000000ce3ad15d [ 3585.844822][T16021] kobject: 'rx-0' (000000002a07ed13): auto cleanup 'remove' event [ 3585.852837][T16021] kobject: 'rx-0' (000000002a07ed13): kobject_uevent_env [ 3585.860262][T16021] kobject: 'rx-0' (000000002a07ed13): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 3585.872028][T16021] kobject: 'rx-0' (000000002a07ed13): auto cleanup kobject_del [ 3585.879824][T16021] kobject: 'rx-0' (000000002a07ed13): calling ktype release [ 3585.887146][T16021] kobject: 'rx-0': free name [ 3585.891911][T16021] kobject: 'tx-0' (0000000070b75e25): kobject_cleanup, parent 00000000ce3ad15d [ 3585.900900][T16021] kobject: 'tx-0' (0000000070b75e25): auto cleanup 'remove' event [ 3585.908866][T16021] kobject: 'tx-0' (0000000070b75e25): kobject_uevent_env [ 3585.915931][T16021] kobject: 'tx-0' (0000000070b75e25): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 3585.927338][T16021] kobject: 'tx-0' (0000000070b75e25): auto cleanup kobject_del [ 3585.935132][T16021] kobject: 'tx-0' (0000000070b75e25): calling ktype release [ 3585.942518][T16021] kobject: 'tx-0': free name [ 3585.947751][T16021] kobject: 'queues' (00000000ce3ad15d): kobject_cleanup, parent 00000000dd563f29 [ 3585.956957][T16021] kobject: 'queues' (00000000ce3ad15d): calling ktype release [ 3585.965023][T16021] kobject: 'queues' (00000000ce3ad15d): kset_release [ 3585.971758][T16021] kobject: 'queues': free name [ 3585.976771][T16021] kobject: 'ip6_vti0' (00000000c77e09d9): kobject_uevent_env [ 3585.984507][T16021] kobject: 'ip6_vti0' (00000000c77e09d9): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 3585.995834][T15809] kobject: 'lo' (000000005f3f07d7): kobject_cleanup, parent 00000000dd563f29 [ 3585.996182][T16016] kobject: 'nfs_client' (000000001c3b3a39): kobject_uevent_env [ 3586.007239][T15809] kobject: 'lo' (000000005f3f07d7): calling ktype release [ 3586.012430][T16016] kobject: 'nfs_client' (000000001c3b3a39): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 3586.022440][T15809] kobject: 'lo': free name [ 3586.030043][T16016] kobject: 'nfs_client' (000000001c3b3a39): kobject_cleanup, parent 00000000dd563f29 [ 3586.034972][T15809] kobject: 'lo' (00000000ecf66d42): kobject_cleanup, parent 00000000dd563f29 [ 3586.044029][T16021] kobject: 'ip6_vti0' (00000000c77e09d9): kobject_cleanup, parent 00000000dd563f29 [ 3586.056319][T15809] kobject: 'lo' (00000000ecf66d42): calling ktype release [ 3586.062669][T16016] kobject: 'nfs_client' (000000001c3b3a39): calling ktype release [ 3586.073050][T15809] kobject: 'lo': free name [ 3586.077626][T16021] kobject: 'ip6_vti0' (00000000c77e09d9): calling ktype release [ 3586.090579][T16016] kobject: 'nfs_client': free name [ 3586.093823][T16021] kobject: 'ip6_vti0': free name [ 3586.198775][T16021] kobject: 'rx-0' (00000000849c7dd1): kobject_cleanup, parent 0000000016ed4251 [ 3586.217980][T16021] kobject: 'rx-0' (00000000849c7dd1): auto cleanup 'remove' event [ 3586.225971][T16021] kobject: 'rx-0' (00000000849c7dd1): kobject_uevent_env [ 3586.233375][T16021] kobject: 'rx-0' (00000000849c7dd1): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 3586.244710][T16021] kobject: 'rx-0' (00000000849c7dd1): auto cleanup kobject_del [ 3586.252708][T16021] kobject: 'rx-0' (00000000849c7dd1): calling ktype release [ 3586.260270][T16021] kobject: 'rx-0': free name [ 3586.264989][T16021] kobject: 'tx-0' (00000000f07507f5): kobject_cleanup, parent 0000000016ed4251 [ 3586.274483][T16021] kobject: 'tx-0' (00000000f07507f5): auto cleanup 'remove' event [ 3586.282703][T16021] kobject: 'tx-0' (00000000f07507f5): kobject_uevent_env [ 3586.289814][T16021] kobject: 'tx-0' (00000000f07507f5): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 3586.302378][T16021] kobject: 'tx-0' (00000000f07507f5): auto cleanup kobject_del [ 3586.310054][T16021] kobject: 'tx-0' (00000000f07507f5): calling ktype release [ 3586.317416][T16021] kobject: 'tx-0': free name [ 3586.322467][T16021] kobject: 'queues' (0000000016ed4251): kobject_cleanup, parent 00000000dd563f29 [ 3586.323159][ T27] audit: type=1804 audit(1565117611.265:4333): pid=16017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1468/memory.events" dev="sda1" ino=16631 res=1 [ 3586.346046][T16021] kobject: 'queues' (0000000016ed4251): calling ktype release [ 3586.365809][T16021] kobject: 'queues' (0000000016ed4251): kset_release [ 3586.372624][T16021] kobject: 'queues': free name [ 3586.377908][T16021] kobject: 'ip_vti0' (000000002341263c): kobject_uevent_env [ 3586.385377][T16021] kobject: 'ip_vti0' (000000002341263c): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 3586.396529][ T27] audit: type=1800 audit(1565117611.265:4334): pid=16017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="memory.events" dev="sda1" ino=16631 res=0 [ 3586.448263][T16021] kobject: 'ip_vti0' (000000002341263c): kobject_cleanup, parent 00000000dd563f29 [ 3586.457580][T16021] kobject: 'ip_vti0' (000000002341263c): calling ktype release [ 3586.469078][T16021] kobject: 'ip_vti0': free name [ 3586.475155][T16021] kobject: 'batman_adv' (0000000069953668): kobject_uevent_env [ 3586.484381][T16021] kobject: 'batman_adv' (0000000069953668): kobject_uevent_env: filter function caused the event to drop! [ 3586.497499][T16021] kobject: 'batman_adv' (0000000069953668): kobject_cleanup, parent 00000000dd563f29 [ 3586.510539][T16021] kobject: 'batman_adv' (0000000069953668): calling ktype release [ 3586.519230][T16021] kobject: (0000000069953668): dynamic_kobj_release [ 3586.525928][T16021] kobject: 'batman_adv': free name [ 3586.533897][T16021] kobject: 'rx-0' (0000000046aaaad4): kobject_cleanup, parent 0000000032f2c5f4 [ 3586.543820][T16021] kobject: 'rx-0' (0000000046aaaad4): auto cleanup 'remove' event [ 3586.554622][T16021] kobject: 'rx-0' (0000000046aaaad4): kobject_uevent_env [ 3586.562933][T16021] kobject: 'rx-0' (0000000046aaaad4): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 3586.579552][T16021] kobject: 'rx-0' (0000000046aaaad4): auto cleanup kobject_del [ 3586.587438][T16021] kobject: 'rx-0' (0000000046aaaad4): calling ktype release [ 3586.595226][T16021] kobject: 'rx-0': free name [ 3586.608368][T16021] kobject: 'tx-0' (000000000d6e00ec): kobject_cleanup, parent 0000000032f2c5f4 [ 3586.617323][T16021] kobject: 'tx-0' (000000000d6e00ec): auto cleanup 'remove' event [ 3586.625782][T16021] kobject: 'tx-0' (000000000d6e00ec): kobject_uevent_env [ 3586.633206][T16021] kobject: 'tx-0' (000000000d6e00ec): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 3586.644453][T16021] kobject: 'tx-0' (000000000d6e00ec): auto cleanup kobject_del [ 3586.652724][T16021] kobject: 'tx-0' (000000000d6e00ec): calling ktype release [ 3586.658372][ T3900] kobject: 'loop0' (0000000002befbee): kobject_uevent_env [ 3586.660083][T16021] kobject: 'tx-0': free name [ 3586.670227][ T3900] kobject: 'loop0' (0000000002befbee): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 3586.672713][T16021] kobject: 'queues' (0000000032f2c5f4): kobject_cleanup, parent 00000000dd563f29 [ 3586.694479][T16021] kobject: 'queues' (0000000032f2c5f4): calling ktype release [ 3586.703010][T16021] kobject: 'queues' (0000000032f2c5f4): kset_release [ 3586.710577][T16021] kobject: 'queues': free name [ 3586.716234][T16021] kobject: 'erspan0' (00000000e418edee): kobject_uevent_env [ 3586.725570][T16021] kobject: 'erspan0' (00000000e418edee): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 3586.788405][T16021] kobject: 'erspan0' (00000000e418edee): kobject_cleanup, parent 00000000dd563f29 [ 3586.798343][T16021] kobject: 'erspan0' (00000000e418edee): calling ktype release [ 3586.806086][T16021] kobject: 'erspan0': free name [ 3586.812968][T16021] kobject: 'batman_adv' (0000000018dac273): kobject_uevent_env [ 3586.820717][T16021] kobject: 'batman_adv' (0000000018dac273): kobject_uevent_env: filter function caused the event to drop! [ 3586.832346][T16021] kobject: 'batman_adv' (0000000018dac273): kobject_cleanup, parent 00000000dd563f29 [ 3586.842629][T16021] kobject: 'batman_adv' (0000000018dac273): calling ktype release [ 3586.850519][T16021] kobject: (0000000018dac273): dynamic_kobj_release [ 3586.857220][T16021] kobject: 'batman_adv': free name [ 3586.862940][T16021] kobject: 'rx-0' (000000006eb34709): kobject_cleanup, parent 0000000022df38a7 [ 3586.872209][T16021] kobject: 'rx-0' (000000006eb34709): auto cleanup 'remove' event [ 3586.880771][T16021] kobject: 'rx-0' (000000006eb34709): kobject_uevent_env [ 3586.888228][T16021] kobject: 'rx-0' (000000006eb34709): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 3586.899642][T16021] kobject: 'rx-0' (000000006eb34709): auto cleanup kobject_del [ 3586.907563][T16021] kobject: 'rx-0' (000000006eb34709): calling ktype release [ 3586.914945][T16021] kobject: 'rx-0': free name [ 3586.919740][T16021] kobject: 'tx-0' (00000000a2e0fec2): kobject_cleanup, parent 0000000022df38a7 [ 3586.928731][T16021] kobject: 'tx-0' (00000000a2e0fec2): auto cleanup 'remove' event [ 3586.936615][T16021] kobject: 'tx-0' (00000000a2e0fec2): kobject_uevent_env [ 3586.943999][T16021] kobject: 'tx-0' (00000000a2e0fec2): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 3586.955286][T16021] kobject: 'tx-0' (00000000a2e0fec2): auto cleanup kobject_del [ 3586.963520][T16021] kobject: 'tx-0' (00000000a2e0fec2): calling ktype release [ 3586.970852][T16021] kobject: 'tx-0': free name [ 3586.975553][T16021] kobject: 'queues' (0000000022df38a7): kobject_cleanup, parent 00000000dd563f29 [ 3586.984748][T16021] kobject: 'queues' (0000000022df38a7): calling ktype release [ 3586.992340][T16021] kobject: 'queues' (0000000022df38a7): kset_release [ 3586.999630][T16021] kobject: 'queues': free name [ 3587.004764][T16021] kobject: 'gretap0' (000000008c8092a5): kobject_uevent_env [ 3587.012310][T16021] kobject: 'gretap0' (000000008c8092a5): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 3587.058193][T16021] kobject: 'gretap0' (000000008c8092a5): kobject_cleanup, parent 00000000dd563f29 [ 3587.068288][T16021] kobject: 'gretap0' (000000008c8092a5): calling ktype release [ 3587.075927][T16021] kobject: 'gretap0': free name [ 3587.083660][T16021] kobject: 'rx-0' (00000000a310f22c): kobject_cleanup, parent 000000005d1fd601 [ 3587.092800][T16021] kobject: 'rx-0' (00000000a310f22c): auto cleanup 'remove' event [ 3587.100946][T16021] kobject: 'rx-0' (00000000a310f22c): kobject_uevent_env [ 3587.108143][T16021] kobject: 'rx-0' (00000000a310f22c): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 3587.119222][T16021] kobject: 'rx-0' (00000000a310f22c): auto cleanup kobject_del [ 3587.126778][T16021] kobject: 'rx-0' (00000000a310f22c): calling ktype release [ 3587.134203][T16021] kobject: 'rx-0': free name [ 3587.138889][T16021] kobject: 'tx-0' (000000005a7cc9f3): kobject_cleanup, parent 000000005d1fd601 [ 3587.147867][T16021] kobject: 'tx-0' (000000005a7cc9f3): auto cleanup 'remove' event [ 3587.155971][T16021] kobject: 'tx-0' (000000005a7cc9f3): kobject_uevent_env [ 3587.163310][T16021] kobject: 'tx-0' (000000005a7cc9f3): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 3587.174821][T16021] kobject: 'tx-0' (000000005a7cc9f3): auto cleanup kobject_del [ 3587.182434][T16021] kobject: 'tx-0' (000000005a7cc9f3): calling ktype release [ 3587.190274][T16021] kobject: 'tx-0': free name [ 3587.195020][T16021] kobject: 'queues' (000000005d1fd601): kobject_cleanup, parent 00000000dd563f29 [ 3587.204179][T16021] kobject: 'queues' (000000005d1fd601): calling ktype release [ 3587.212654][T16021] kobject: 'queues' (000000005d1fd601): kset_release [ 3587.219642][T16021] kobject: 'queues': free name [ 3587.224702][T16021] kobject: 'gre0' (00000000b0968657): kobject_uevent_env [ 3587.231830][T16021] kobject: 'gre0' (00000000b0968657): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 3587.258336][T15809] kobject: 'nfs_client' (00000000325e5b97): kobject_uevent_env [ 3587.266408][T15809] kobject: 'nfs_client' (00000000325e5b97): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 3587.277410][T15809] kobject: 'nfs_client' (00000000325e5b97): kobject_cleanup, parent 00000000dd563f29 [ 3587.278144][T16021] kobject: 'gre0' (00000000b0968657): kobject_cleanup, parent 00000000dd563f29 [ 3587.286909][T15809] kobject: 'nfs_client' (00000000325e5b97): calling ktype release [ 3587.298709][T16021] kobject: 'gre0' (00000000b0968657): calling ktype release [ 3587.304028][T15809] kobject: 'nfs_client': free name [ 3587.313284][T16021] kobject: 'gre0': free name [ 3587.316740][T15809] kobject: 'nfs_client' (00000000de58cda9): kobject_uevent_env [ 3587.328807][T15809] kobject: 'nfs_client' (00000000de58cda9): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 3587.339224][T15809] kobject: 'nfs_client' (00000000de58cda9): kobject_cleanup, parent 00000000dd563f29 [ 3587.348754][T15809] kobject: 'nfs_client' (00000000de58cda9): calling ktype release [ 3587.350758][T16021] kobject: 'rx-0' (00000000f2df6a8a): kobject_cleanup, parent 0000000062974f32 [ 3587.356792][T15809] kobject: 'nfs_client': free name [ 3587.366852][T16021] kobject: 'rx-0' (00000000f2df6a8a): auto cleanup 'remove' event [ 3587.381228][T16021] kobject: 'rx-0' (00000000f2df6a8a): kobject_uevent_env [ 3587.388413][T16021] kobject: 'rx-0' (00000000f2df6a8a): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 3587.401151][T16021] kobject: 'rx-0' (00000000f2df6a8a): auto cleanup kobject_del [ 3587.409294][T16021] kobject: 'rx-0' (00000000f2df6a8a): calling ktype release [ 3587.417020][T16021] kobject: 'rx-0': free name [ 3587.423533][T16021] kobject: 'tx-0' (0000000064004c10): kobject_cleanup, parent 0000000062974f32 [ 3587.432555][T16021] kobject: 'tx-0' (0000000064004c10): auto cleanup 'remove' event [ 3587.440558][T16021] kobject: 'tx-0' (0000000064004c10): kobject_uevent_env [ 3587.447622][T16021] kobject: 'tx-0' (0000000064004c10): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 3587.459689][T16021] kobject: 'tx-0' (0000000064004c10): auto cleanup kobject_del [ 3587.468175][T16021] kobject: 'tx-0' (0000000064004c10): calling ktype release [ 3587.476145][T16021] kobject: 'tx-0': free name [ 3587.481027][T16021] kobject: 'queues' (0000000062974f32): kobject_cleanup, parent 00000000dd563f29 [ 3587.490480][T16021] kobject: 'queues' (0000000062974f32): calling ktype release [ 3587.498302][T16021] kobject: 'queues' (0000000062974f32): kset_release [ 3587.505029][T16021] kobject: 'queues': free name [ 3587.510167][T16021] kobject: 'tunl0' (000000003e79df22): kobject_uevent_env [ 3587.517294][T16021] kobject: 'tunl0' (000000003e79df22): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 3587.568231][T16021] kobject: 'tunl0' (000000003e79df22): kobject_cleanup, parent 00000000dd563f29 [ 3587.577436][T16021] kobject: 'tunl0' (000000003e79df22): calling ktype release [ 3587.585830][T16021] kobject: 'tunl0': free name [ 3587.592243][T16021] kobject: 'rx-0' (00000000b11196a1): kobject_cleanup, parent 000000003a77fa69 [ 3587.601478][T16021] kobject: 'rx-0' (00000000b11196a1): auto cleanup 'remove' event [ 3587.609611][T16021] kobject: 'rx-0' (00000000b11196a1): kobject_uevent_env [ 3587.617161][T16021] kobject: 'rx-0' (00000000b11196a1): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 3587.628571][T16021] kobject: 'rx-0' (00000000b11196a1): auto cleanup kobject_del [ 3587.636178][T16021] kobject: 'rx-0' (00000000b11196a1): calling ktype release [ 3587.643763][T16021] kobject: 'rx-0': free name [ 3587.648568][T16021] kobject: 'tx-0' (0000000050cd286a): kobject_cleanup, parent 000000003a77fa69 [ 3587.657688][T16021] kobject: 'tx-0' (0000000050cd286a): auto cleanup 'remove' event [ 3587.666947][ T27] audit: type=1804 audit(1565117612.605:4335): pid=16042 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1468/memory.events" dev="sda1" ino=16631 res=1 [ 3587.678066][T16021] kobject: 'tx-0' (0000000050cd286a): kobject_uevent_env [ 3587.693316][ T27] audit: type=1804 audit(1565117612.615:4336): pid=16043 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir749004290/syzkaller.K3NAMl/1468/memory.events" dev="sda1" ino=16631 res=1 [ 3587.699998][T16021] kobject: 'tx-0' (0000000050cd286a): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 3587.737414][T16021] kobject: 'tx-0' (0000000050cd286a): auto cleanup kobject_del [ 3587.745717][T16021] kobject: 'tx-0' (0000000050cd286a): calling ktype release [ 3587.754123][T16021] kobject: 'tx-0': free name [ 3587.758900][T16021] kobject: 'queues' (000000003a77fa69): kobject_cleanup, parent 00000000dd563f29 [ 3587.768939][T16021] kobject: 'queues' (000000003a77fa69): calling ktype release [ 3587.776556][T16021] kobject: 'queues' (000000003a77fa69): kset_release [ 3587.783791][T16021] kobject: 'queues': free name [ 3587.789059][T16021] kobject: 'lo' (000000007728cff5): kobject_uevent_env [ 3587.796199][T16021] kobject: 'lo' (000000007728cff5): fill_kobj_path: path = '/devices/virtual/net/lo' [ 3587.829121][T15809] kobject: 'rx-0' (00000000f035a59a): kobject_cleanup, parent 000000000b29fdc8 [ 3587.838833][T15809] kobject: 'rx-0' (00000000f035a59a): auto cleanup 'remove' event [ 3587.846870][T15809] kobject: 'rx-0' (00000000f035a59a): kobject_uevent_env [ 3587.854205][T15809] kobject: 'rx-0' (00000000f035a59a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3587.865212][T15809] kobject: 'rx-0' (00000000f035a59a): auto cleanup kobject_del [ 3587.873048][T15809] kobject: 'rx-0' (00000000f035a59a): calling ktype release [ 3587.880383][T15809] kobject: 'rx-0': free name [ 3587.885010][T15809] kobject: 'tx-0' (0000000054631cbc): kobject_cleanup, parent 000000000b29fdc8 [ 3587.894223][T15809] kobject: 'tx-0' (0000000054631cbc): auto cleanup 'remove' event [ 3587.902594][T15809] kobject: 'tx-0' (0000000054631cbc): kobject_uevent_env [ 3587.910805][T15809] kobject: 'tx-0' (0000000054631cbc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3587.923361][T15809] kobject: 'tx-0' (0000000054631cbc): auto cleanup kobject_del [ 3587.932228][T15809] kobject: 'tx-0' (0000000054631cbc): calling ktype release [ 3587.941865][T15809] kobject: 'tx-0': free name [ 3587.948423][T15809] kobject: 'queues' (000000000b29fdc8): kobject_cleanup, parent 00000000dd563f29 [ 3587.958093][T15809] kobject: 'queues' (000000000b29fdc8): calling ktype release [ 3587.966003][T15809] kobject: 'queues' (000000000b29fdc8): kset_release [ 3587.973282][T15809] kobject: 'queues': free name [ 3587.978592][T15809] kobject: 'ip6gre0' (000000001981bdb8): kobject_uevent_env [ 3587.986209][T15809] kobject: 'ip6gre0' (000000001981bdb8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3587.997741][T16021] kobject: 'lo' (000000007728cff5): kobject_cleanup, parent 00000000dd563f29 [ 3588.007632][T16021] kobject: 'lo' (000000007728cff5): calling ktype release [ 3588.015232][T16021] kobject: 'lo': free name [ 3588.058461][T15809] kobject: 'ip6gre0' (000000001981bdb8): kobject_cleanup, parent 00000000dd563f29 [ 3588.071050][T15809] kobject: 'ip6gre0' (000000001981bdb8): calling ktype release [ 3588.079649][T15809] kobject: 'ip6gre0': free name [ 3588.086117][T15809] kobject: 'rx-0' (0000000082000d91): kobject_cleanup, parent 000000000ac822ad [ 3588.097835][T15809] kobject: 'rx-0' (0000000082000d91): auto cleanup 'remove' event [ 3588.106744][T15809] kobject: 'rx-0' (0000000082000d91): kobject_uevent_env [ 3588.116534][T15809] kobject: 'rx-0' (0000000082000d91): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.130590][T15809] kobject: 'rx-0' (0000000082000d91): auto cleanup kobject_del [ 3588.138415][T15809] kobject: 'rx-0' (0000000082000d91): calling ktype release [ 3588.145714][T15809] kobject: 'rx-0': free name [ 3588.153185][T15809] kobject: 'tx-0' (000000005009210f): kobject_cleanup, parent 000000000ac822ad [ 3588.162627][T15809] kobject: 'tx-0' (000000005009210f): auto cleanup 'remove' event [ 3588.174306][T15809] kobject: 'tx-0' (000000005009210f): kobject_uevent_env [ 3588.181403][T15809] kobject: 'tx-0' (000000005009210f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.195170][T15809] kobject: 'tx-0' (000000005009210f): auto cleanup kobject_del [ 3588.203583][T15809] kobject: 'tx-0' (000000005009210f): calling ktype release [ 3588.214099][T15809] kobject: 'tx-0': free name [ 3588.218963][T15809] kobject: 'queues' (000000000ac822ad): kobject_cleanup, parent 00000000dd563f29 [ 3588.230944][T15809] kobject: 'queues' (000000000ac822ad): calling ktype release [ 3588.238896][T15809] kobject: 'queues' (000000000ac822ad): kset_release [ 3588.245767][T15809] kobject: 'queues': free name [ 3588.253738][T15809] kobject: 'ip6tnl0' (00000000e8b58b0e): kobject_uevent_env [ 3588.261882][T15809] kobject: 'ip6tnl0' (00000000e8b58b0e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.310593][T15809] kobject: 'ip6tnl0' (00000000e8b58b0e): kobject_cleanup, parent 00000000dd563f29 [ 3588.320310][T15809] kobject: 'ip6tnl0' (00000000e8b58b0e): calling ktype release [ 3588.331619][T15809] kobject: 'ip6tnl0': free name [ 3588.338135][T15809] kobject: 'rx-0' (0000000058c34337): kobject_cleanup, parent 00000000c86ccaff [ 3588.347664][T15809] kobject: 'rx-0' (0000000058c34337): auto cleanup 'remove' event [ 3588.358670][T15809] kobject: 'rx-0' (0000000058c34337): kobject_uevent_env [ 3588.365702][T15809] kobject: 'rx-0' (0000000058c34337): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.376815][T15809] kobject: 'rx-0' (0000000058c34337): auto cleanup kobject_del [ 3588.384695][T15809] kobject: 'rx-0' (0000000058c34337): calling ktype release [ 3588.392122][T15809] kobject: 'rx-0': free name [ 3588.396739][T15809] kobject: 'tx-0' (0000000097df1f75): kobject_cleanup, parent 00000000c86ccaff [ 3588.405702][T15809] kobject: 'tx-0' (0000000097df1f75): auto cleanup 'remove' event [ 3588.413553][T15809] kobject: 'tx-0' (0000000097df1f75): kobject_uevent_env [ 3588.420661][T15809] kobject: 'tx-0' (0000000097df1f75): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.431594][T15809] kobject: 'tx-0' (0000000097df1f75): auto cleanup kobject_del [ 3588.439234][T15809] kobject: 'tx-0' (0000000097df1f75): calling ktype release [ 3588.446509][T15809] kobject: 'tx-0': free name [ 3588.451170][T15809] kobject: 'queues' (00000000c86ccaff): kobject_cleanup, parent 00000000dd563f29 [ 3588.460343][T15809] kobject: 'queues' (00000000c86ccaff): calling ktype release [ 3588.467798][T15809] kobject: 'queues' (00000000c86ccaff): kset_release [ 3588.474497][T15809] kobject: 'queues': free name [ 3588.479515][T15809] kobject: 'sit0' (000000005794011c): kobject_uevent_env [ 3588.486627][T15809] kobject: 'sit0' (000000005794011c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.518078][T15809] kobject: 'sit0' (000000005794011c): kobject_cleanup, parent 00000000dd563f29 [ 3588.527113][T15809] kobject: 'sit0' (000000005794011c): calling ktype release [ 3588.535865][T15809] kobject: 'sit0': free name [ 3588.541315][T15809] kobject: 'rx-0' (00000000b377d00f): kobject_cleanup, parent 00000000968cb987 [ 3588.550320][T15809] kobject: 'rx-0' (00000000b377d00f): auto cleanup 'remove' event [ 3588.558293][T15809] kobject: 'rx-0' (00000000b377d00f): kobject_uevent_env [ 3588.565352][T15809] kobject: 'rx-0' (00000000b377d00f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.576162][T15809] kobject: 'rx-0' (00000000b377d00f): auto cleanup kobject_del [ 3588.583928][T15809] kobject: 'rx-0' (00000000b377d00f): calling ktype release [ 3588.591245][T15809] kobject: 'rx-0': free name [ 3588.595886][T15809] kobject: 'tx-0' (00000000d9354a06): kobject_cleanup, parent 00000000968cb987 [ 3588.604869][T15809] kobject: 'tx-0' (00000000d9354a06): auto cleanup 'remove' event [ 3588.612700][T15809] kobject: 'tx-0' (00000000d9354a06): kobject_uevent_env [ 3588.619797][T15809] kobject: 'tx-0' (00000000d9354a06): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.630584][T15809] kobject: 'tx-0' (00000000d9354a06): auto cleanup kobject_del [ 3588.638219][T15809] kobject: 'tx-0' (00000000d9354a06): calling ktype release [ 3588.645493][T15809] kobject: 'tx-0': free name [ 3588.650297][T15809] kobject: 'queues' (00000000968cb987): kobject_cleanup, parent 00000000dd563f29 [ 3588.659518][T15809] kobject: 'queues' (00000000968cb987): calling ktype release [ 3588.667003][T15809] kobject: 'queues' (00000000968cb987): kset_release [ 3588.673700][T15809] kobject: 'queues': free name [ 3588.678745][T15809] kobject: 'ip6_vti0' (00000000c995c3a6): kobject_uevent_env [ 3588.686093][T15809] kobject: 'ip6_vti0' (00000000c995c3a6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.738197][T15809] kobject: 'ip6_vti0' (00000000c995c3a6): kobject_cleanup, parent 00000000dd563f29 [ 3588.748048][T15809] kobject: 'ip6_vti0' (00000000c995c3a6): calling ktype release [ 3588.755962][T15809] kobject: 'ip6_vti0': free name [ 3588.761735][T15809] kobject: 'rx-0' (000000000a82dd24): kobject_cleanup, parent 00000000f5043d89 [ 3588.770706][T15809] kobject: 'rx-0' (000000000a82dd24): auto cleanup 'remove' event [ 3588.778553][T15809] kobject: 'rx-0' (000000000a82dd24): kobject_uevent_env [ 3588.785578][T15809] kobject: 'rx-0' (000000000a82dd24): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.796369][T15809] kobject: 'rx-0' (000000000a82dd24): auto cleanup kobject_del [ 3588.803967][T15809] kobject: 'rx-0' (000000000a82dd24): calling ktype release [ 3588.811338][T15809] kobject: 'rx-0': free name [ 3588.815960][T15809] kobject: 'tx-0' (0000000095524a21): kobject_cleanup, parent 00000000f5043d89 [ 3588.824931][T15809] kobject: 'tx-0' (0000000095524a21): auto cleanup 'remove' event [ 3588.833055][T15809] kobject: 'tx-0' (0000000095524a21): kobject_uevent_env [ 3588.840173][T15809] kobject: 'tx-0' (0000000095524a21): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.851050][T15809] kobject: 'tx-0' (0000000095524a21): auto cleanup kobject_del [ 3588.858705][T15809] kobject: 'tx-0' (0000000095524a21): calling ktype release [ 3588.865995][T15809] kobject: 'tx-0': free name [ 3588.870637][T15809] kobject: 'queues' (00000000f5043d89): kobject_cleanup, parent 00000000dd563f29 [ 3588.879763][T15809] kobject: 'queues' (00000000f5043d89): calling ktype release [ 3588.887206][T15809] kobject: 'queues' (00000000f5043d89): kset_release [ 3588.893921][T15809] kobject: 'queues': free name [ 3588.898949][T15809] kobject: 'ip_vti0' (0000000013a7cd96): kobject_uevent_env [ 3588.906210][T15809] kobject: 'ip_vti0' (0000000013a7cd96): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3588.968223][T15809] kobject: 'ip_vti0' (0000000013a7cd96): kobject_cleanup, parent 00000000dd563f29 [ 3588.968493][T16021] kobject: 'nfs_client' (00000000a6d6a6ee): kobject_uevent_env [ 3588.977452][T15809] kobject: 'ip_vti0' (0000000013a7cd96): calling ktype release [ 3588.987882][T16021] kobject: 'nfs_client' (00000000a6d6a6ee): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 3588.992644][T15809] kobject: 'ip_vti0': free name [ 3589.003034][T16021] kobject: 'nfs_client' (00000000a6d6a6ee): kobject_cleanup, parent 00000000dd563f29 [ 3589.017239][T16021] kobject: 'nfs_client' (00000000a6d6a6ee): calling ktype release [ 3589.025108][T16021] kobject: 'nfs_client': free name [ 3589.031241][T15809] kobject: 'batman_adv' (000000003b98fe35): kobject_uevent_env [ 3589.039054][T15809] kobject: 'batman_adv' (000000003b98fe35): kobject_uevent_env: filter function caused the event to drop! [ 3589.050495][T15809] kobject: 'batman_adv' (000000003b98fe35): kobject_cleanup, parent 00000000dd563f29 [ 3589.059966][T15809] kobject: 'batman_adv' (000000003b98fe35): calling ktype release [ 3589.067778][T15809] kobject: (000000003b98fe35): dynamic_kobj_release [ 3589.074394][T15809] kobject: 'batman_adv': free name [ 3589.079685][T15809] kobject: 'rx-0' (0000000039741b58): kobject_cleanup, parent 00000000395f9f0f [ 3589.088995][T15809] kobject: 'rx-0' (0000000039741b58): auto cleanup 'remove' event [ 3589.096800][T15809] kobject: 'rx-0' (0000000039741b58): kobject_uevent_env [ 3589.103857][T15809] kobject: 'rx-0' (0000000039741b58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3589.114871][T15809] kobject: 'rx-0' (0000000039741b58): auto cleanup kobject_del [ 3589.122468][T15809] kobject: 'rx-0' (0000000039741b58): calling ktype release [ 3589.129985][T15809] kobject: 'rx-0': free name [ 3589.134607][T15809] kobject: 'tx-0' (0000000051a5ab99): kobject_cleanup, parent 00000000395f9f0f [ 3589.143560][T15809] kobject: 'tx-0' (0000000051a5ab99): auto cleanup 'remove' event [ 3589.151409][T15809] kobject: 'tx-0' (0000000051a5ab99): kobject_uevent_env [ 3589.158480][T15809] kobject: 'tx-0' (0000000051a5ab99): kobject_uevent_env: uevent_suppress caused the event to drop! [ 3589.169248][T15809] kobject: 'tx-0' (0000000051a5ab99): auto cleanup kobject_del [ 3589.176831][T15809] kobject: 'tx-0' (0000000051a5ab99): calling ktype release [ 3589.184146][T15809] kobject: 'tx-0': free name [ 3589.188781][T15809] kobject: 'queues' (00000000395f9f0f): kobject_cleanup, parent 00000000dd563f29 [ 3589.198007][T15809] kobject: 'queues' (00000000395f9f0f): calling ktype release [ 3589.205460][T15809] kobject: 'queues' (00000000395f9f0f): kset_release [ 3589.212164][T15809] kobject: 'queues': free name