35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 367.343668][ T26] audit: type=1804 audit(1589836359.197:331): pid=17718 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/113/memory.events" dev="sda1" ino=16363 res=1 [ 367.459309][ T26] audit: type=1804 audit(1589836359.507:332): pid=17729 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/114/memory.events" dev="sda1" ino=16364 res=1 [ 367.601795][ T26] audit: type=1800 audit(1589836359.537:333): pid=17729 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16364 res=0 [ 367.673008][T17593] IPVS: ftp: loaded support on port[0] = 21 21:12:39 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8918, 0x0) 21:12:40 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8918, 0x0) [ 368.047867][T17760] IPVS: ftp: loaded support on port[0] = 21 21:12:40 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8918, 0x0) 21:12:40 executing program 5 (fault-call:6 fault-nth:0): unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8918, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:40 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6002920000180600fe8000000000000000000000000000bbde8000000000000000000000000000aa00004e"], 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000080)='?', 0x1}], 0x1) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000440)=""/219, &(0x7f0000000540)=0xdb) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') r4 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @local}, &(0x7f00000000c0)) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)={0x1c, r3, 0x711, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r8, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x50, r3, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={[], 0x21}}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) getsockopt$netlink(r0, 0x10e, 0x2, &(0x7f0000000580)=""/143, &(0x7f0000000640)=0x8f) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000000)={&(0x7f00000000c0)="759d9d6f5e2b7334099056d537f37131186ab88211e19ae452b0797a72f50e889f7180655368ed00ab76403def4263cd240b5480effbc79664721c4a78623b87706b77b06c4076edeaa62911042e460bc4cdcface91616a27f44b61585d31c5435f887046713e349fda9cfe525f8b89318ebe767e7a637b576c2d2f4f2df4bfb0907acc3114ac06349b8612ce68134560d82fb1068a91d4612ae1ac6bebc1e4508fad1b55ac793b5a25105cc9ebc3a1d5d318cfad27bea3aac28096d542c467548a112a0343dda86598181ad0973d099", &(0x7f00000001c0)=""/142, &(0x7f0000000280)="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", &(0x7f0000000380)="bf0612810f4a8a6b593413053b956389c7b88243855622c55197e674c5854a092e8cc6222ff6fb238176769fbc87a81aa6bad967fbcfed45338edc38034924c86515931c1f0296e5a45c9cdbae591396580600a3110930b6c8e57a1e955cb27ad801e9645b5fda99964cd31da4bb0d7f59ae33f3c50f9dac40e2535880a833b1e946e470b4d73ef653f35de287a982a51ce60eb83b3f0dc0d136cebf867c13a744c43515", 0x80000001, r0}, 0x38) 21:12:40 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 368.321473][T17777] IPVS: ftp: loaded support on port[0] = 21 [ 368.358385][T17781] IPVS: ftp: loaded support on port[0] = 21 [ 368.454820][T17792] IPVS: ftp: loaded support on port[0] = 21 21:12:40 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:12:41 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 369.467947][T17792] FAULT_INJECTION: forcing a failure. [ 369.467947][T17792] name failslab, interval 1, probability 0, space 0, times 1 [ 369.503537][T17792] CPU: 1 PID: 17792 Comm: syz-executor.5 Not tainted 5.7.0-rc5-syzkaller #0 [ 369.512261][T17792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.522324][T17792] Call Trace: [ 369.525739][T17792] dump_stack+0x188/0x20d [ 369.530141][T17792] should_fail.cold+0x5/0xa [ 369.534658][T17792] ? fault_create_debugfs_attr+0x140/0x140 [ 369.540537][T17792] should_failslab+0x5/0xf [ 369.544996][T17792] __kmalloc+0x2d9/0x7a0 [ 369.549302][T17792] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 369.555344][T17792] ? tomoyo_realpath_from_path+0xc2/0x620 [ 369.561112][T17792] ? lock_release+0x800/0x800 [ 369.565791][T17792] ? __lock_acquire+0xcbb/0x4c50 [ 369.570735][T17792] tomoyo_realpath_from_path+0xc2/0x620 [ 369.576292][T17792] ? tomoyo_profile+0x42/0x50 [ 369.580981][T17792] tomoyo_path_number_perm+0x1c2/0x4d0 [ 369.586500][T17792] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 369.592150][T17792] ? tomoyo_execute_permission+0x470/0x470 [ 369.598100][T17792] ? __fget_files+0x30d/0x500 [ 369.602832][T17792] ? __fget_files+0x32f/0x500 [ 369.607520][T17792] ? ksys_dup3+0x3c0/0x3c0 [ 369.611975][T17792] ? __sb_end_write+0x101/0x1d0 [ 369.616864][T17792] ? vfs_write+0x161/0x5d0 [ 369.621368][T17792] security_file_ioctl+0x6c/0xb0 [ 369.626329][T17792] ksys_ioctl+0x50/0x180 [ 369.630581][T17792] __x64_sys_ioctl+0x6f/0xb0 [ 369.635176][T17792] ? lockdep_hardirqs_on+0x463/0x620 [ 369.640509][T17792] do_syscall_64+0xf6/0x7d0 [ 369.645107][T17792] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 369.651002][T17792] RIP: 0033:0x45ca29 [ 369.654894][T17792] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.674495][T17792] RSP: 002b:00007f5b0fdfbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 369.682933][T17792] RAX: ffffffffffffffda RBX: 00000000004f4180 RCX: 000000000045ca29 [ 369.690898][T17792] RDX: 0000000020000100 RSI: 0000000000008918 RDI: 0000000000000004 [ 369.698884][T17792] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 369.706856][T17792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 369.714829][T17792] R13: 00000000000006cd R14: 00000000004c9ae2 R15: 00007f5b0fdfc6d4 21:12:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000040), 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) listen(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x1e, &(0x7f00000000c0)=[@in], 0x10) 21:12:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000040)={@private0={0xfc, 0x0, [], 0x1}, 0x6f, r5}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000030003b0500000000000000000000000044000100400001000b00010073616d706c65"], 0x58}}, 0x0) sendfile(r2, r1, 0x0, 0x100000197) 21:12:41 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8918, 0x0) 21:12:42 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 370.134245][T17908] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 370.172005][T17909] IPVS: ftp: loaded support on port[0] = 21 [ 370.207072][T17910] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. 21:12:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x6, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="2277f292252155b21c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x900}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x54) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001940)=@ipv4_newaddr={0x20, 0x11, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8}]}, 0x20}}, 0x0) syz_genetlink_get_family_id$fou(0x0) [ 370.470831][T17932] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 21:12:42 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000300), &(0x7f0000000000)=0x4) 21:12:42 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 370.704114][T17932] device bond2 entered promiscuous mode [ 370.762633][T17938] device bridge3 entered promiscuous mode [ 370.773088][T17792] ERROR: Out of memory at tomoyo_realpath_from_path. [ 370.803543][T17932] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 370.835002][T17932] bond3 (uninitialized): Released all slaves [ 371.074471][T17938] device bridge4 entered promiscuous mode 21:12:43 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8918, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000001600)=ANY=[], 0x23fa00) ioctl$FITRIM(r2, 0x40305839, &(0x7f0000000000)={0x0, 0x0, 0x9}) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x155) sendmsg$AUDIT_LIST_RULES(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3f5, 0x2, 0x70bd2d, 0x3, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4800}, 0x8800) getsockopt$IP_SET_OP_GET_BYINDEX(r4, 0x1, 0x53, &(0x7f00000002c0)={0x7, 0x7, 0x2}, &(0x7f0000000300)=0x28) ioctl$SIOCAX25CTLCON(r4, 0x89e8, &(0x7f0000000180)={@null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, 0x4, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @null, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000034000511d25a80648c63940d0124fc60100006400a0003000200000037153e370a00018002000000d1bd", 0x33fe0}], 0x1}, 0x0) sendfile(r0, r1, 0x0, 0xf03b0000) 21:12:43 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001340)=ANY=[@ANYBLOB="900e000030003deb0000000000000000000000007c0e0100780e01000a0001007065646974000000640e0280200e02000000000000002576a6ac000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ed8d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000034a400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400005001400060006000100000000000600020000000000140006000600010000a541cbfb0f57fac1f49548e7985d00000006000200572c0000140006000600010000000000060002000000000004000600ad770d8fc7b398363e78c9a3a4e7b4df36064ad2bcd779b84c9158dd85680baa148458a595c67621dc44e74d4d40085eee240d031bfc1456d4264b9ab42fffa96210bd344fe20884a75ff755a1e4e0017e4a53fa9cb79622ffc8d92dc611628fd144e2c8e88af40b72fc2faf9a3175e136c649d642dff8dcd4392eb3e74a2dd1652aab966f3ca956fc6aa5143afbd7c5624f183d58ee8d2fece319acc7c034e98138d4d6fed417fd42e49ba08086dca9e08e0883c97aa8bddaf924065f9a9a9fd790cff1acb099638837a3cd6cc74dbad4e80fe5f8783ae99d81615ac36e8aae67806a130ff85b4dc33e5908eacccaa14d0b92c6f9705641524cbf0a6f7d3e7e91c032db44bd12818bc9b056f58e671dbe0ef8a46f464bc85afb5c73ac3dad9cef644bca3f4e7e1b"], 0xe90}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 21:12:43 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose, @default, @netrom, @bcast, @rose, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) syz_genetlink_get_family_id$fou(0x0) r1 = accept(r0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) write$binfmt_elf64(r1, 0x0, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f0000001700)=@nfc, &(0x7f0000001780)=0x80, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000040)=0x9c) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000017c0)={r5, 0x7b}, 0x8) 21:12:43 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:12:43 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 371.429342][T18013] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 371.443783][ T26] kauditd_printk_skb: 23 callbacks suppressed [ 371.443795][ T26] audit: type=1804 audit(1589836363.487:357): pid=18011 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/119/memory.events" dev="sda1" ino=16376 res=1 [ 371.493175][T18013] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. [ 371.509415][T18012] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 371.555121][ T26] audit: type=1800 audit(1589836363.487:358): pid=18011 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16376 res=0 [ 371.559917][T18016] IPVS: ftp: loaded support on port[0] = 21 [ 371.581232][T18015] IPVS: ftp: loaded support on port[0] = 21 [ 371.603284][T18023] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 371.638339][T18029] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 371.720971][T18023] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. [ 371.725548][ T26] audit: type=1804 audit(1589836363.487:359): pid=18011 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/119/memory.events" dev="sda1" ino=16376 res=1 21:12:43 executing program 1 (fault-call:6 fault-nth:0): unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8918, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:43 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r1 = accept4(r0, &(0x7f0000000500)=@ax25={{0x3, @netrom}, [@netrom, @netrom, @default, @remote, @bcast, @null, @rose, @netrom]}, &(0x7f0000000580)=0x80, 0x80800) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000005c0)=@int=0xd1, 0x4) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000000)="d5a51ad71fcbbd47003b64a1b272d12953124033be7b3455e03b50da69e4", 0x1e) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/135, 0x87}, {&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000000300)=""/5, 0x5}], 0x3, &(0x7f0000000380)=""/56, 0x38}, 0x2000) sendmsg$RDMA_NLDEV_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80100001}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x1401, 0x100, 0x70bd27, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4040081) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6d, &(0x7f0000000040), &(0x7f0000000100)=0x8) r4 = accept(0xffffffffffffffff, &(0x7f0000000840)=@pptp={0x18, 0x2, {0x0, @private}}, &(0x7f00000008c0)=0x80) getsockname$ax25(r4, &(0x7f0000000900)={{0x3, @default}, [@bcast, @default, @rose, @rose, @null, @netrom, @remote, @bcast]}, &(0x7f0000000980)=0x48) 21:12:44 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 372.010315][ T26] audit: type=1804 audit(1589836363.537:360): pid=18014 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/80/memory.events" dev="sda1" ino=16382 res=1 [ 372.045880][T18064] IPVS: ftp: loaded support on port[0] = 21 21:12:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000080)=0x1fe, 0xffffffffffffffd0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) r3 = socket(0x11, 0x0, 0x8) socket$rxrpc(0x21, 0x2, 0x2) bind(0xffffffffffffffff, &(0x7f0000000280)=@ipx={0x4, 0x26b, 0x36f, "3c90fc553742", 0xd9}, 0x80) sendmsg$IPSET_CMD_DEL(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20040000}, 0x80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x34) sendmmsg(r4, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, &(0x7f0000005340)={0x0, 0x1c9c380}) [ 372.163881][T18015] IPVS: ftp: loaded support on port[0] = 21 [ 372.181588][T18083] IPVS: ftp: loaded support on port[0] = 21 [ 372.190184][ T26] audit: type=1800 audit(1589836363.537:361): pid=18014 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16382 res=0 [ 372.320481][ T26] audit: type=1804 audit(1589836363.547:362): pid=18014 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/80/memory.events" dev="sda1" ino=16382 res=1 [ 372.507695][ T26] audit: type=1804 audit(1589836363.737:363): pid=18031 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/119/memory.events" dev="sda1" ino=16376 res=1 21:12:44 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 372.725031][ T26] audit: type=1804 audit(1589836363.827:364): pid=18034 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/80/memory.events" dev="sda1" ino=16382 res=1 [ 372.914532][ T26] audit: type=1804 audit(1589836364.287:365): pid=18092 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/120/memory.events" dev="sda1" ino=16372 res=1 [ 373.144594][ T26] audit: type=1800 audit(1589836364.287:366): pid=18092 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16372 res=0 21:12:45 executing program 3: pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x8000d, 0x0) sendmmsg$alg(r4, &(0x7f0000000200)=[{0x6, 0x0, 0x0}], 0x1, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010000d0700a47f793f000000ff030000", @ANYRES32=r5, @ANYBLOB="00000000e60000001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) [ 373.294272][T18064] FAULT_INJECTION: forcing a failure. [ 373.294272][T18064] name failslab, interval 1, probability 0, space 0, times 0 [ 373.379316][T18064] CPU: 1 PID: 18064 Comm: syz-executor.1 Not tainted 5.7.0-rc5-syzkaller #0 [ 373.388095][T18064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.398142][T18064] Call Trace: [ 373.401451][T18064] dump_stack+0x188/0x20d [ 373.405793][T18064] should_fail.cold+0x5/0xa [ 373.410306][T18064] ? fault_create_debugfs_attr+0x140/0x140 [ 373.416125][T18064] should_failslab+0x5/0xf [ 373.420539][T18064] __kmalloc+0x2d9/0x7a0 [ 373.424784][T18064] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 373.430769][T18064] ? tomoyo_realpath_from_path+0xc2/0x620 [ 373.431493][T18151] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 373.436485][T18064] ? lock_release+0x800/0x800 [ 373.436524][T18064] ? __lock_acquire+0xcbb/0x4c50 [ 373.436573][T18064] tomoyo_realpath_from_path+0xc2/0x620 [ 373.460945][T18064] ? tomoyo_profile+0x42/0x50 [ 373.465630][T18064] tomoyo_path_number_perm+0x1c2/0x4d0 [ 373.471100][T18064] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 373.476749][T18064] ? tomoyo_execute_permission+0x470/0x470 [ 373.482571][T18064] ? __fget_files+0x30d/0x500 [ 373.487272][T18064] ? __fget_files+0x32f/0x500 [ 373.491959][T18064] ? ksys_dup3+0x3c0/0x3c0 [ 373.496369][T18064] ? __sb_end_write+0x101/0x1d0 [ 373.501228][T18064] ? vfs_write+0x161/0x5d0 [ 373.505664][T18064] security_file_ioctl+0x6c/0xb0 [ 373.510605][T18064] ksys_ioctl+0x50/0x180 [ 373.514850][T18064] __x64_sys_ioctl+0x6f/0xb0 [ 373.519445][T18064] ? lockdep_hardirqs_on+0x463/0x620 [ 373.524746][T18064] do_syscall_64+0xf6/0x7d0 [ 373.529254][T18064] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 373.535147][T18064] RIP: 0033:0x45ca29 [ 373.539039][T18064] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.558635][T18064] RSP: 002b:00007f9748333c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 373.567074][T18064] RAX: ffffffffffffffda RBX: 00000000004f4180 RCX: 000000000045ca29 [ 373.575062][T18064] RDX: 0000000020000100 RSI: 0000000000008918 RDI: 0000000000000004 [ 373.583049][T18064] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 373.591019][T18064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 373.598985][T18064] R13: 00000000000006cd R14: 00000000004c9ae2 R15: 00007f97483346d4 21:12:45 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x2, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:45 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 373.726846][T18153] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 373.809228][T18064] ERROR: Out of memory at tomoyo_realpath_from_path. [ 373.832407][T18195] IPVS: ftp: loaded support on port[0] = 21 21:12:46 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 373.993993][T18201] IPVS: ftp: loaded support on port[0] = 21 [ 375.077333][T18195] IPVS: ftp: loaded support on port[0] = 21 21:12:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}]}, 0x3c}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r3, 0x1, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffffff00}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x43b05d968dcdd211}, 0x4081) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$bt_hci(r8, 0x0, 0x3, &(0x7f0000000440)=""/206, &(0x7f0000000280)=0xce) r9 = accept4$bt_l2cap(r7, &(0x7f0000000540)={0x1f, 0x0, @fixed}, &(0x7f0000000580)=0xe, 0x0) accept4$bt_l2cap(r9, 0x0, &(0x7f00000005c0), 0x80000) 21:12:48 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:12:48 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8918, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:48 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:12:48 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r1 = accept4(r0, &(0x7f0000000500)=@ax25={{0x3, @netrom}, [@netrom, @netrom, @default, @remote, @bcast, @null, @rose, @netrom]}, &(0x7f0000000580)=0x80, 0x80800) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000005c0)=@int=0xd1, 0x4) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000000)="d5a51ad71fcbbd47003b64a1b272d12953124033be7b3455e03b50da69e4", 0x1e) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/135, 0x87}, {&(0x7f0000000280)=""/80, 0x50}, {&(0x7f0000000300)=""/5, 0x5}], 0x3, &(0x7f0000000380)=""/56, 0x38}, 0x2000) sendmsg$RDMA_NLDEV_CMD_GET(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80100001}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x1401, 0x100, 0x70bd27, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4040081) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6d, &(0x7f0000000040), &(0x7f0000000100)=0x8) r4 = accept(0xffffffffffffffff, &(0x7f0000000840)=@pptp={0x18, 0x2, {0x0, @private}}, &(0x7f00000008c0)=0x80) getsockname$ax25(r4, &(0x7f0000000900)={{0x3, @default}, [@bcast, @default, @rose, @rose, @null, @netrom, @remote, @bcast]}, &(0x7f0000000980)=0x48) 21:12:48 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x10, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 376.503613][T18290] IPVS: ftp: loaded support on port[0] = 21 [ 376.558492][ T26] kauditd_printk_skb: 14 callbacks suppressed [ 376.558504][ T26] audit: type=1804 audit(1589836368.597:381): pid=18300 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/123/memory.events" dev="sda1" ino=16370 res=1 [ 376.593624][T18294] IPVS: ftp: loaded support on port[0] = 21 21:12:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) pipe(&(0x7f0000000340)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {0xf, 0x10}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="06006cb0", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 376.608396][T18298] IPVS: ftp: loaded support on port[0] = 21 [ 376.830439][ T26] audit: type=1804 audit(1589836368.627:382): pid=18299 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/84/memory.events" dev="sda1" ino=16369 res=1 21:12:49 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 377.078092][ T26] audit: type=1800 audit(1589836368.627:383): pid=18299 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16369 res=0 21:12:49 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, &(0x7f0000000200)="8fa7d2918ab25f4fc02bc62c672db7467d918426755daa362a9c0bd60787e2255bd894a02f37d680bbcb713384fa7a2624d50bc5b3bde28e", 0x38, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000040)=0x4000000, 0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0x2880008, r2}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="01000000273d71144accbfa20fa2fbf0571e5f25db7a3713b3989bccc312392025830a23ff90eae1f63553fbc926b6af0f841f64628487c1833498011d59d32ca6252496c836b4bf21a821b9abb00285451694b825cdb4d665086adbc4cdf41d405c16e4ff0000000000003bd568348a769fbecf12245fef2136c9ff16040e6c3847d8faa8ac59edc26af2502cbfd2a6c3b093dce727d8a130d806890d69164ad0a6f9e13fb64d200a074062926d09f670b8140bf509491a9648decf5b4894f2a75a322814b4987c8625d24673ab4abdf57bd951631af72bd53833a1dfc06f3d622b31a6029c9a9b052d9863cdec059c77500f141f43faf0433d8aff58ebc7151d1203eb2791ba8f5f22f9c616892c0433e09377962664e57609f45e4e9c841813dbd4ed31757fcf8e5e427deeaa49788f64000000000000000000000000000000b2909e640ac76ebf095537638ca709790f2dee5819fad934b43826c2738e97baec6aee177618abf5689af8949ffee8a0e32713be7e0805d2112d9eb5862437fdb63ecf3a9831a3392fe41ea1993e61888bf371ee61fc5a6301b166573c8b490880985963"], &(0x7f00000000c0)=0x7c) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r4, 0x8}, 0x8) r5 = socket(0xa, 0x2, 0x0) r6 = gettid() sendmsg$AUDIT_SET(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x34, 0x3e9, 0x200, 0x70bd2d, 0x25dfdbfe, {0x48, 0x0, 0x0, r6, 0x5e0ced6d, 0x7, 0x4, 0x0, 0x3f3}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x8840) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000000)={0x11, @rand_addr, 0xfffd, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 377.235954][ T26] audit: type=1804 audit(1589836368.637:384): pid=18299 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/84/memory.events" dev="sda1" ino=16369 res=1 [ 377.467141][ T26] audit: type=1800 audit(1589836368.647:385): pid=18300 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16370 res=0 21:12:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x80) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="30000000000000000000000000000000000040ceffff0000000000001d9dc17a", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\r\x00', @ANYRES32=r4, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) getpeername$tipc(r5, &(0x7f0000000040)=@name, &(0x7f0000000240)=0x10) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="3000000013000100"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001300", @ANYRES32=0x0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="fd6e48818ca028e9bbe2630b74309c2000fc60c843a510b25e00e627556150b8d9125e101517dfc62d25ce4311b594fe256bf8fe2d20d25fba5b38057dbb243d3b08a0bf3ad06f70d78b71c9928fed236eb47e0795c646585f562eca50cc06d15d3e93ac5a2c11"], 0x30}}, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r6, 0x800443d2, &(0x7f0000000080)={0x5, &(0x7f00000002c0)=[{@fixed}, {@none}, {}, {@fixed}, {}]}) 21:12:49 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 377.606058][ T26] audit: type=1804 audit(1589836368.657:386): pid=18303 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/123/memory.events" dev="sda1" ino=16370 res=1 [ 377.713973][ T26] audit: type=1804 audit(1589836368.787:387): pid=18315 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/123/memory.events" dev="sda1" ino=16370 res=1 [ 377.855403][ T26] audit: type=1804 audit(1589836368.867:388): pid=18310 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/84/memory.events" dev="sda1" ino=16369 res=1 [ 377.939816][T18298] IPVS: ftp: loaded support on port[0] = 21 [ 378.036007][ T26] audit: type=1804 audit(1589836369.347:389): pid=18383 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/124/memory.events" dev="sda1" ino=16382 res=1 21:12:50 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:12:50 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @rose, @null]}, 0x10) listen(r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x24, 0x2, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}]}, 0x24}}, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) getsockname$tipc(r2, &(0x7f00000020c0), &(0x7f0000002100)=0x10) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r4, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x110, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010102}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2f}}}}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2cd9}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @private=0xa010101}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x529}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @remote, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3fcf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_MON={0x4}]}, 0x110}, 0x1, 0x0, 0x0, 0x4001}, 0x40) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000080)={0x1, 'vlan0\x00', {}, 0x7ff}) [ 378.227577][ T26] audit: type=1800 audit(1589836369.347:390): pid=18383 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16382 res=0 21:12:50 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000080)='?', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000080)) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000d00ea1100000005000000", 0x29}], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r5, @ANYBLOB="000000000000000014001280090001007663616e"], 0x34}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x7, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_ADDRESS={0x8, 0x1, @rand_addr=0x64010100}]}, 0x20}, 0x1, 0xf0ffffff, 0x0, 0x4040}, 0x40804) 21:12:50 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x2, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:50 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:12:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r2, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="60000000331bcbc786920942151a00c2e873904cbcc950b7fbd21950b2402b14e0", @ANYRES32=r5, @ANYBLOB="14000100ff0200000000000000000000000000011400020000000000000000000000ffff00000000"], 0x40}}, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r11, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000700)={&(0x7f0000000540)={0x190, 0x0, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKSTATE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x4}, @ETHTOOL_A_LINKSTATE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x190}, 0x1, 0x0, 0x0, 0xc001}, 0x14) syz_emit_ethernet(0x6a, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) [ 378.691554][T18445] IPVS: ftp: loaded support on port[0] = 21 [ 378.697821][T18443] IPVS: ftp: loaded support on port[0] = 21 21:12:51 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x4c01, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:51 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 379.501656][T18472] IPVS: ftp: loaded support on port[0] = 21 [ 379.587488][T18465] IPVS: ftp: loaded support on port[0] = 21 [ 379.606416][T18446] IPVS: ftp: loaded support on port[0] = 21 21:12:51 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff800) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 379.903420][T18450] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 21:12:52 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff800) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 379.999638][T18455] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 380.078240][T18478] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 380.098453][T18458] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 21:12:52 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @rose, @null]}, 0x10) listen(r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x24, 0x2, 0x2, 0x5, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}]}, 0x24}}, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) getsockname$tipc(r2, &(0x7f00000020c0), &(0x7f0000002100)=0x10) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r4, 0xb03, 0x0, 0x0, {0x13}}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x110, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x64010102}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2f}}}}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2cd9}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @private=0xa010101}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x529}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @remote, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3fcf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_MON={0x4}]}, 0x110}, 0x1, 0x0, 0x0, 0x4001}, 0x40) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000080)={0x1, 'vlan0\x00', {}, 0x7ff}) 21:12:52 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3af054182a9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f464de7188b"}, 0x60) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000100)=""/149, 0x207a0cb3) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 21:12:52 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff800) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 380.428022][T18475] IPVS: ftp: loaded support on port[0] = 21 21:12:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000706010341d43a83587cff000100e9000500010047"], 0x1}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d50b441e692763513ef87456558", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', r3}, 0x10) 21:12:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000380)='threaded\x00', 0x9) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="3000000013000100"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001300", @ANYRES32=0x0, @ANYBLOB="65ab50e0c19fd09483bbe1426e69140600da55", @ANYRES32, @ANYBLOB], 0x30}}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000980)={0x26c, r2, 0x200, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x81}, @NL80211_ATTR_IE={0x1d7, 0x2a, "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"}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x1}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x1f}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_FREQUENCIES={0x2c, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0xffff}, {0x8, 0x0, 0xc0}, {0x8, 0x0, 0x3ff}, {0x8, 0x0, 0x7}, {0x8, 0x0, 0x7f}]}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x1c, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x80}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x6, 0x1, "21a2"}]}, @NL80211_ATTR_SCAN_SSIDS={0x14, 0x2d, 0x0, 0x1, [{0x7, 0x0, [0x6, 0xe, 0x7]}, {0x5, 0x0, [0x1c]}]}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x81}]}, 0x26c}, 0x1, 0x0, 0x0, 0x2000c044}, 0x100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r5 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x80800) sendfile(r0, r5, &(0x7f00000001c0)=0x4, 0x9) ioctl$int_in(r4, 0x5421, &(0x7f0000000040)=0x2) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000002c0)=@add_del={0x2, &(0x7f0000000280)='bridge_slave_0\x00'}) sendfile(r4, r3, 0x0, 0xffffffff880) [ 381.267175][T18619] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 381.329624][T18619] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 21:12:55 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x10, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:55 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffffffff800) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:12:55 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x541b, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.stat\x00', 0x7a05, 0x1700) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8400420}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3fb, 0x20, 0x70bd2a, 0x25dfdbfe, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000004}, 0x4004) sendfile(r3, r2, 0x0, 0x100000001) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r6, r5, 0x0, 0x100000001) accept4$alg(r6, 0x0, 0x0, 0x80800) epoll_wait(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r7, r4, 0x0, 0x100000001) 21:12:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000027c0)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @rand_addr=0x64010102}, 0x2, 0x1, 0x2, 0x1}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000000000)="f6e351b6933b99e5e61c7fe4576221975b4d", 0x12}, {&(0x7f0000001180)="bc219d653a0abfe24c109d0c8da9379af60019388f54c99a348e9ffe6bdbc137099e6987ad1bfaf711216865d3cd83fbb003af406e37f3402dd9bd2acf1f4317846d8d22879a29c38e548660c95a2c3852888c393c68857c955d1c65051c23a54c2ad424b11b70d7d723e52991bc1af24d", 0x71}, {&(0x7f0000001200)="4b8ee53acd42bcf6600488a8191be5243ec3e4108332c2dab1a7426d28649f3183be37f2a1a3875fd5841c69b81a1e7299001d85fb7f57afac1579d7630e50993cf8e0981275f6b8464aba8a078665198d261bc9146d6229a2f605e43365ec1683286e3faf11848be39f554f7f9cab044ec772bc025e25ab62dc9ddaad56a32cc895e2839039aba1cea4537a56033168c6a5a59b96e0b47423481abe38612d5cafb167400bc203dabd90e8987360a7907b2b853252aad9d8f950c6c03cd6fe5216f6211c045934696bbcb78d79ab2324", 0xd0}, {&(0x7f0000001300)="ec68fd477c02231ea789da01003d98d4518764fe10c4deb089253d8ade8e887003a584b12d3bd0f10b39c92ba4a79011dfb5077c2516e02f2f5b19f43198f8d2a1e4648f12e392cc4b57306ddbd430822d216e01", 0x54}, {&(0x7f0000001380)="aa967b16d9c11b4481c1c9827339bb121ed740212b1bfd1207c259603017c6556be04e4c563013495ce64a189629ec8c1b5b6945f9f53945f0e48d1704f4bd2f6e4444de0713bfd3101d1e394828b068e4712fb2f7f02e817d407558adc310b48841b745fe605029cca7111000cc33749cdf3dd78e60090b06d2a67bce24fdf578fddc3288d332d9841ba5c15c0e4c6a72", 0x91}, {&(0x7f0000001440)="3b623f5a22f195585def812cf62424433cc22a59bf909d174f18ba2150f3275e9140a347f5b70eff589453e795dac8263f3c0bfd7a216124718cbafb78a7893f7519335823a59245821c09fc08faa9a350d8c0a28722001e6d50f299dbe0320b5963688b38007ba18e5f3226a950b8e552f576fef41181a7cfcb650dcafd1e07", 0x80}, {&(0x7f0000000080)="a1c0161fe5e77855dfb76a011546dd366de9dee53f8ac2d3e047b8b5191da2bef8832a28060ff62d7434", 0x2a}, {&(0x7f00000014c0)="6938b91e5674164ff1b59bff9d96a9e30f8ad2f6c5b2c1a5991daccdd19d8b4e2591f14b0678bfcd085ad88a8bec5007de3a5930c1df1c08c84716eeffa465a3f11b8624d51a4008a4711b02daab63", 0x4f}, {&(0x7f0000001540)="fba118332c2a4c40aea2b9f2", 0xc}], 0xa, &(0x7f0000001640)=[{0xe0, 0x0, 0x4, "1e07a47bc77004580ddd4fca48b81dbc0e9ca7f758c757e649e38b98c3737cdd6ea6ce3cf682eeee723e86e464ff2e1da293ec0731d0f144b98a76506b1e7c6cd0bc44d1a8f566cfe1be8b7c3487d90daa27558b5630bc01bd78a0fdc21d908351ce332abae5908e4a4f7b7580b793a91697f03aa8e6dd9e9ba5669bd013224947eaf0342db9ed6d484c9fe66264a0a20310a3d2aa4ab69b919a688eb818f388fac08b66e42a3d683b4b77e2185bd247469618ac82a52ace54b88e3434df542fcba512beb76a23a4f80d5fd8"}, {0x48, 0x111, 0x7, "f183b5160bf8b231b5d3324a69e95f992a617608623145fc61a189461e896adc08df0bbf366d7452fda89214e9a58d4db20ba7f28c7cfe7e"}, {0x1010, 0x109, 0x101, "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"}, {0x40, 0x1, 0x5, "feced4a353c55e0c898bdaa6ef690f7c58dd761a0828415cdcf4eb94be486dde0bca099dd694cb9a8b94f91c154d1fe7"}], 0x1178}, 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000e68000)={0x2, 0x4e22, @local}, 0x10) 21:12:55 executing program 4: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x40001000) [ 383.083774][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 383.140076][T18633] IPVS: ftp: loaded support on port[0] = 21 21:12:55 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000040)=0x9c) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3, 0x5, 0xc6}, 0xc) socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmsg$inet_sctp(r4, &(0x7f0000000400)={&(0x7f0000000040)=@in={0x2, 0x0, @local}, 0x64, &(0x7f00000000c0)=[{&(0x7f0000000140)="1c", 0x1}], 0x1, &(0x7f0000000080), 0x18, 0x404c059}, 0x8010) 21:12:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000000)={0x1, 0x3, "773ae6", 0x3f}) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=@newlink={0x64, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}, @IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x64}}, 0x0) [ 383.186759][T18639] IPVS: ftp: loaded support on port[0] = 21 [ 383.235896][ T26] kauditd_printk_skb: 30 callbacks suppressed [ 383.235918][ T26] audit: type=1804 audit(1589836375.277:421): pid=18644 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir516100174/syzkaller.xn1nMe/146/cgroup.controllers" dev="sda1" ino=16003 res=1 [ 383.404555][T18665] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 21:12:55 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffffffff800) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 383.452195][ T26] audit: type=1804 audit(1589836375.317:422): pid=18634 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir516100174/syzkaller.xn1nMe/146/cgroup.controllers" dev="sda1" ino=16003 res=1 [ 383.529010][T18685] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 21:12:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x4a03}, 0xc, &(0x7f0000000600)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c050000", @ANYRES16=r1, @ANYBLOB="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"], 0x51c}}, 0x4800) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)={0x3, 'veth0\x00', {0x3}, 0x1}) 21:12:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x12) r2 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x13) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8000003}) pwrite64(r1, &(0x7f0000000600)="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", 0x4000, 0x1200) write$binfmt_aout(r2, &(0x7f0000000800)={{0x107, 0x5, 0xf3, 0x167, 0x96, 0x1, 0xd3}, "2409c448db4d4a6829df302e", [[], [], [], [], [], [], [], []]}, 0x82c) [ 383.692633][ T26] audit: type=1804 audit(1589836375.317:423): pid=18634 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir516100174/syzkaller.xn1nMe/146/cgroup.controllers" dev="sda1" ino=16003 res=1 21:12:55 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r1, 0xffffffffffffffff, 0x0, 0xffffffff800) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 383.834749][T18703] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.3'. [ 383.934210][T18708] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.3'. [ 384.175725][T18633] IPVS: ftp: loaded support on port[0] = 21 [ 384.227490][T18639] IPVS: ftp: loaded support on port[0] = 21 21:12:56 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x4c01, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000080)='?', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'wg2\x00', r3}) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c0000001400b59500000000000000000a000000cec11dc7dcc64a86eb43638299da81413326dca5a6c35a839e9f576af25fe1a44a831aff9638b29de970afaa2e2ca735cab6737b0f5b0cff18cb9d745807ab1d1be8773e9740a444d8ba5bb7d74bbb6d4acbcdd5ca356e0096fac3c7d1c630629dd0c24aca1e49c19447c106d20368f3f04e2dec1f52d25cd35f994f998328939da69c87df5bb7a8c82018b1936c2f0896886376888f29626d363a18e64b30da517599fe", @ANYRES32=r7, @ANYBLOB="1400020000000000000000000000ffff00000000"], 0x2c}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000bc0)={0x2e0, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x6d}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}]}}, {{0x8}, {0x108, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x100}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}}]}}]}, 0x2e0}, 0x1, 0x0, 0x0, 0x4008000}, 0x24048811) listen(r0, 0x9) setsockopt$inet6_opts(r0, 0x29, 0x2, &(0x7f0000000180)=@hopopts={0x0, 0x1, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @pad1]}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 21:12:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) recvfrom$unix(r1, &(0x7f0000000340)=""/126, 0x7e, 0x20, &(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x49815) connect$x25(0xffffffffffffffff, &(0x7f00000000c0)={0x9, @remote={[], 0x1}}, 0x12) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="4000000014009ff300000000000000000a000200", @ANYRES32=r5, @ANYBLOB="14000100fe8000004e324901000000000000000014000200fe"], 0x40}}, 0x0) sendto$l2tp(r1, &(0x7f0000000480)="fa8c3989f60c91f3a6715823b14e95ffb73b88fae4da267833f5626dbc03429b17f90477cd1ba8fb5ca26c83ff4e060808e42dc9685586290e1ae950f7790ad71af3133298ed55267e26724a3571e38861f63444965ffb825a4c8f3e2a3dd509f250a9db7378bb9a610aadb52d39a6c59258779142821fbe652378e6a1", 0x7d, 0x4008000, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}, 0x3}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="2000001011003b0e00000000000000001c81d8008e000007", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[@ANYBLOB="3000000013000100"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001300", @ANYRES32=0x0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="e54d571dd3f308701a75ba2f51c6b97d8b4180c0ebc10cd720945bff6cd2380adcb45dbc90ec9d5587a8b0ec018235e905da8ea01b75ca90c5330db4c3c5b27bab6b50b05e311108eaef286663d20316"], 0x30}}, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000500)={0x0, 0x0, 0x2, 0x0, [], [{0x6, 0x0, 0x3, 0x5, 0x3, 0xaa32}, {0x7, 0x9, 0x1, 0x3, 0x1, 0x8}], [[], []]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 21:12:56 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) sendfile(r1, r0, 0x0, 0xffffffff800) sendfile(r1, r0, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r1, @ANYRES32, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r0, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:12:56 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000013000100"/20, @ANYRES32=0x0, @ANYBLOB="00800000000000000000130070fc0c0dbe14170e56b4", @ANYRES32=0x0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x30}}, 0x0) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x3fa, 0x2, 0x70bd2a, 0x25dfdbff, {0x1, 0x0, 0x0, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x48801}, 0x81) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESHEX=r3, @ANYRESHEX, @ANYRESHEX, @ANYRESHEX], 0x3c}, 0x1, 0x0, 0x0, 0x48000}, 0x4000) sendmsg$nl_route_sched(r2, &(0x7f0000001c40)={&(0x7f0000001b80)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001bc0)=@delchain={0x2c, 0x65, 0x400, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {0x9, 0xfff1}, {0xffff, 0x10}, {0x2, 0x10}}, [@TCA_RATE={0x6, 0x5, {0x1f, 0x9d}}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc0}, 0x440) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000023000511d25a80648c63940d0424fc60", 0x14}], 0x1}, 0x0) 21:12:56 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5421, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 384.894742][T18780] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 21:12:57 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r2 = socket(0x1e, 0x2, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) connect$x25(r3, &(0x7f0000000000)={0x9, @remote={[], 0x0}}, 0x12) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) listen(r1, 0x83) [ 384.952086][T18779] IPVS: ftp: loaded support on port[0] = 21 [ 384.984251][T18785] IPVS: ftp: loaded support on port[0] = 21 21:12:57 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2c8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) sendto$inet6(r3, &(0x7f0000000200)='\n', 0xfffffdef, 0x40080, 0x0, 0x1f4) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="5d079daf2078a1cfedd9af3847cd19d80429eb2ab0f6ebdc56bbbbe93b68579056c6b56d4c6411d91af9d8656ebdc449ab52deb807a32dc40724dad65363b0e4fbe2a3d14ed0b61ca95cea4d7c039b6f26b95cd0ddae2a710251b79c9dc3e0b0b50a46c70d2b6892f1e24b05ca54d327eb286236c2b530a8b1686ccb26879a21a84701b5bfa11aea6534ca85e1a009c018464f0217e3b7baf3b74bc4c8a946e5a7"], 0x2) openat$cgroup_type(r0, &(0x7f0000000440)='cgroup.type\x00', 0x2, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000640)=0x1c) recvmmsg(r4, &(0x7f0000006e00)=[{{0x0, 0x0, &(0x7f0000005700)=[{&(0x7f0000003440)=""/128, 0x80}], 0x1}}, {{0x0, 0x0, &(0x7f0000006d40), 0x271}}], 0x2, 0x2, 0x0) r5 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000380)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_ADD(r4, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)={0xd0, r5, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x58, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2b04479d}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe04c}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x133c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3651}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x20ad}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76fa1533}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1dd0d0c3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7187a41e}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0xd0}, 0x1, 0x0, 0x0, 0x1}, 0x20004000) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2012, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000140), 0x12) sendfile(r1, r1, 0x0, 0xc0000006) 21:12:57 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000180)={0x0, 0x7, 0x1, 0x119}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="390000001000090468fe07002b0000000100ff0714000000450001070300001419001a00", 0x24}], 0x1) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x1}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="240000001e005f0214fffffffffffff807000000", 0x14) sendmmsg$alg(r1, &(0x7f0000000140), 0xcc, 0x0) 21:12:57 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) sendfile(r1, r0, 0x0, 0xffffffff800) sendfile(r1, r0, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r1, @ANYRES32, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r0, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 385.198691][T18801] IPVS: ftp: loaded support on port[0] = 21 21:12:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{0x4d}, {0x6}]}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) recvmsg(r2, &(0x7f0000000200)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/95, 0x5f}], 0x1}, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000240)=0x22) 21:12:57 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) sendfile(r1, r0, 0x0, 0xffffffff800) sendfile(r1, r0, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r1, @ANYRES32, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r0, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 386.158486][T18779] IPVS: ftp: loaded support on port[0] = 21 [ 386.219114][T18785] IPVS: ftp: loaded support on port[0] = 21 21:12:59 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x541b, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:12:59 executing program 4: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x2a) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_netdev_private(r3, 0x89fb, &(0x7f00000001c0)="0d5c203769be2a5455ec142237c50eea13080536ce2975efe0f60e14ad83b61871d77ab58ca3b9aeaec054e2f65efad6ecd632c26c1fb7f558400b6c8f390a2e3ddbfdee4e930af9c6db93281945048e9d370e37b3751ab825c5797de72c12c24576907176ef8a6895449e1998c9e09a2b009c836cf8b5022ebc86c98522db99a5a6e0039ca4012a3ca041fc84b266a4d3b04659ee98616029cf83e9e8c54f55fbefe3714153d2a764fe690eed6342e59ff853a800c460765865a81c5649e5622fb1b72e185dc0db00"/222) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) r4 = socket(0x2, 0x1, 0x1) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) splice(r0, 0x0, r4, 0x0, 0x19405, 0x0) 21:12:59 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:12:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"/468, @ANYRES32=0x0], 0x20}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) connect$phonet_pipe(r2, &(0x7f0000000040)={0x23, 0xf7, 0xff}, 0x10) 21:12:59 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r2 = socket(0x1e, 0x2, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) connect$x25(r3, &(0x7f0000000000)={0x9, @remote={[], 0x0}}, 0x12) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) listen(r1, 0x83) [ 387.211596][T18951] IPVS: ftp: loaded support on port[0] = 21 [ 387.223153][T18954] IPVS: ftp: loaded support on port[0] = 21 [ 388.017994][T18951] IPVS: ftp: loaded support on port[0] = 21 21:13:02 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5450, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:02 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x0, 0x6, 0x81, 0x8001, 0x81, 0x3, 0x1, {0x0, @in6={{0xa, 0x4e24, 0x4, @remote, 0x131}}, 0x4d7, 0xfffff801, 0x3f, 0x7ff, 0x6}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000440)={r1, @in6={{0xa, 0x4e23, 0x11, @loopback, 0x1}}}, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r3, r2, 0x0, 0x100000001) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f0000000200)={0x0, @default, @rose={'rose', 0x0}, 0x101, 'syz0\x00', @default, 0x0, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @bcast]}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000880)={&(0x7f0000001000)=""/102400, 0x120933, 0x1000}, 0x20) r6 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'/36]}) accept$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000180)={'team0\x00', r7}) openat$cgroup_ro(r3, &(0x7f0000000280)='cpu.stat\x00', 0x0, 0x0) 21:13:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000880)="2e020200350f000dac0f882363f847a422cf3937153e407f00000000000000d1bd00001f00000000000000000000000000000062000000ec2cf61df5c35dc2aef9163a50a9ab418fec793c3bab3399d4be0d11ba00314c0732bd311a72e9f9b4dbac3cc575bca076addb43a18bd3b60e00005242c2d69a3093ecbe8cd39e362148dc02a8bb2d7e611a4630e8a393d3a66262c54ab9fd6291c16ba4bae051805ab637c8edd7077bf3d7bf545ea3b4651b4bd0ca9a54177793a08a2f67b669a40100ca7ec1abfe2880490929c92a913bfb61144107622524fbb62a9091275301aa925b0cc0c69af01b13806b53099e69b8e82af09bdf3d9239", 0xffffff90}], 0x1}, 0x4044800) r1 = socket(0x10, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000280)=@in={0x2, 0x4e23, @remote}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="0c7e0eb3ef3c", 0x6}, {&(0x7f0000000340)="4b7578a9654f6df065f679ce7041e31398ab8dc90c0c8ebb2334d8c9b8db84eb54f3253019939e69518192a8528e23555aeb4556015df65a0d7735eda88f9d6dca40c96c0bbafe418aca5c10b693ea27cbf8f1f4d7a323d9df81934ea8f92d5792aa50ce7086ac215a3a8d50799ef891d40debd9bcff9804c8b2d70e5db9ad1dce6006a5f420ebccb914e1e5484020b7c6fea81501103596ecebc457bb320ca5c64e67ad5b32ac351f31e0505526", 0xae}, {&(0x7f0000000400)="9b609679dfe3d905e3695a2f145bc01446024afacef2246742240716705c8c2b72758cec94b8c717c7eab6a1a1a28ea1d597fd4e572914ae6c6a0acddaa886d1b9861db90f451e61702b96bb9420a001aca8c387b468cec1e22f633cf7c7e4a5137fd7f083b2e71c0fbb3844ca37718ba297082c10d1690aac9c199994763204ae4483b7cd44aa59fb008c6f57a8c3245270d9bcf30a67a3b3", 0x99}], 0x3, &(0x7f0000000500)=[{0xc0, 0x108, 0x3f, "9079ecc6ac9586045efa999bdabb5e75531c524a10c74618c217503786bca7aa13e7051486fd363c88fbb2b582aabeb94c5e51771fe93c9d33bd337f1d44c124f1a75fb237ce541a921ddb89ddb42f66cbbb0d55f4ad101a77d933be7aa0a7fe7b3ded5eb1042dec5c96b3d4a3ff30dfdda88111fc2972570242569e0cd72ecb2945c19c8b59b6313a3ac14fc3da9f4159403467da279259caf7dd848868a190b09605109e5b27fd2c351932"}], 0xc0}, 0x20040010) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r2, 0xc0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x2, 0x4}, 0x0, 0x0, &(0x7f0000000640)={0x4, 0x9, 0x7b0, 0x1}, &(0x7f0000000680)=0x10001, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x400}}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0xfffffffffffffd99, &(0x7f0000000180)={&(0x7f0000000780)=ANY=[@ANYBLOB="3000ffff0000000000000000000000000000000012083ca6c2039c9574e959a40fc74cc2863911777c022a9b05d1807f765b7b9314a73c802286eeac87c09244944d2e4758649e553e830e92fd67f6388fc7b4c71c832bfaeacdc550ff70357e49bad2", @ANYRESHEX=r0, @ANYBLOB="0552e7ffb20661b61d873248f9c3ff897557a359b87511244915e684c80bbab099255f031dc9df42e1e4ff06ad2996de934d1cd42dcefc1c0100008000000000293dbb399338dc582182defc10acddb836ee3906e0148cb47c669fc8ee7e5ecf8b80025df29d5f994c0b87f57eadb794b1fa1a", @ANYRES32=0x0, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYRES16=r1], 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) write(r4, &(0x7f0000000a40)="751c7793ebd319627d9a0ff581cc433540c61e0517cb697ad782166f72968b3e2aa73b0858a94c7e3d6a96bfc831eca9dc0a3d62faf9282c32e97711eec96f8c61c23953ff42da95220fc264cab5101bcb06c85cdc51b198230391638554aa95cbba6cd0a83a2b8ea570793953967ccdcc0d69b5d98ff5631b70ec3bef9e8a5f00143521d46e7edfc3006d1a81f1f149361af472519132693bb63f485fe13503bc9fd9ad58fddf3d562573a5a4d7c9daf227bc17ce7819600bbbbf4e1e954bfc84254161bb49a254", 0xc8) r5 = socket$inet6(0xa, 0x5, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={r7, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000040)=0x9c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r7}, 0x8) 21:13:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x810, r0, 0x54853000) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xfffffff9}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8000}]}, 0x34}, 0x1, 0x0, 0x0, 0x1c804}, 0x48000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000070605000000000000000000000000000500010007000000a981438773"], 0x9331cb780ee7f491}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x100000002) 21:13:02 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5421, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:02 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd2f5e3103"], 0xa) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000003b80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20800}, 0x0) pipe(&(0x7f0000008f40)={0xffffffffffffffff}) r6 = socket$netlink(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0xa8, r7, 0xb03, 0x0, 0x0, {0x13}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_BEARER={0x6c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth0_to_batadv\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10001}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x80000001, @mcast2, 0x97}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}]}, 0xa8}}, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(r6, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x29}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r5, &(0x7f00000091c0)={&(0x7f0000008f80)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x34, r8, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=r8, @ANYBLOB="200027bd7000fedbdf250400000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f0eb238967bba32168c730d4b4bb46a04fda5f5bc"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, 0x0) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000180)}, {&(0x7f0000000240)="5c8aae08aad2f771ad89190786df5a84d36e244413efbf1a999a7bbdbe170f51bccb2254542cf4a4bc0cc91f324c9e52970cf208bf7f6f411520ce8301e04f2f5317e0f330d849249e43f4c0ff8728fba38aa53434470964079e40a1402882730a517fab35de77ed7e", 0x69}, {&(0x7f00000002c0)="88705c8a3b7cdfb65cafa01a1c618bbf52ff1038284024661da457eff4218ab08bff105d905d8ddc3062767b59407432f9a4c1e2d5c0a93a57d23971a728e6fb13a1343f936b96c9dc45c2bcda0207038e2b6ca14af87fc7ca3a2a14d63d0e969e91478a670b76bc1a08c20289178adf9bf940d1c5d8a0cb9a7f831c6c08", 0x7e}, {&(0x7f0000000340)="ce74df4ce753e3a3903067a7d94349b6b1347bf3272cd435ac842c69508589138f6023a115f1f5511e098e09abf6254ed4b45bc315de14", 0x37}, {&(0x7f0000000580)="e1df12a6ff5af568298ef90aad4247fb955895afbdd97be32463f9bc6583f4b420c83ea8cf6fb2879eb731d0e78d04a5f71a6056e158b01cdbff2bf6ba985f2f14c862ceb34a6a39493181636dab3099b834347d27fe16e93bb3c1c219af8d96568411255bb5d6462902ec4139c021fedf9196ca75bf8eecb7757731f273429c1ba2adbf6c", 0x85}, {&(0x7f0000000640)="e95d3f462d373df306deb38bb2a39b303569931cc2bffefdbab646cdc2fb435206f9ff5db2e702b786d1be3c2ee78218ad6a380b42fe2d42ab5932a5fcd8ed78d163e2677406c3810d3eaa3c41369b6fa75b0670ada4df278b70756ac83a5531d0b07556f106858bc5d96bf2d34a02543db33840cc0d6f41c7aa9869b173a3aea0ea0fe74c4ec3a6b7253486ed8d1a43", 0x90}, {&(0x7f0000000700)="4a01eda2102f4aa1e6068c48e8a72f7d615bf785ac7cf1b3414a1ce32865397ab9847652803467ddc0b234ef4a237009a95879c8ae431f8dcb59bbf61454d5b899a0d555c4fd53af749d688147a5ca82981fceac765394273b04059a40e3df721109469c238556c9fce8898f421aac66397da6a3bae34e0095b740d7870f94921dbe1bb5674a856624e73cdf1710ebc643bcdcdc6089790846ddfa2483766d17a3b4a1db2342365dbd4c8c78e0a68a9b9a81bd576db6de52d667dfaeae220cbbb5a0e6aeec6809524b7080", 0xcb}, {&(0x7f0000000380)="70384c336a7f", 0x6}], 0x8) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 390.500595][T19072] IPVS: ftp: loaded support on port[0] = 21 [ 390.585754][T19077] IPVS: ftp: loaded support on port[0] = 21 [ 390.726863][ T26] audit: type=1804 audit(1589836382.767:424): pid=19097 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/96/memory.events" dev="sda1" ino=16367 res=1 21:13:02 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 390.882628][ T26] audit: type=1800 audit(1589836382.767:425): pid=19097 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16367 res=0 [ 391.049476][ T26] audit: type=1804 audit(1589836382.767:426): pid=19097 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/96/memory.events" dev="sda1" ino=16367 res=1 [ 391.267063][ T26] audit: type=1804 audit(1589836383.067:427): pid=19121 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/96/memory.events" dev="sda1" ino=16367 res=1 21:13:03 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 391.495900][ T26] audit: type=1804 audit(1589836383.377:428): pid=19074 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir516100174/syzkaller.xn1nMe/151/cgroup.controllers" dev="sda1" ino=16374 res=1 21:13:03 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x101}, [@IFLA_NET_NS_PID={0x8}, @IFLA_OPERSTATE={0x5, 0x10, 0x6}]}, 0x30}}, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="3000000013000100"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001300", @ANYRES32=0x0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="b0ce4cd02f13a4a3de03efd5c8f9be6bc993f2e70ada9da8b36af39b15676ead826646a5a8591cdd934270"], 0x30}}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000300)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000040)=0x9c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r4, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x7f, 0x8000, 0x80, 0x0, 0x10, 0x6, 0x3}, &(0x7f00000000c0)=0x9c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x1}, 0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 391.703609][ T26] audit: type=1804 audit(1589836383.377:429): pid=19080 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir516100174/syzkaller.xn1nMe/151/cgroup.controllers" dev="sda1" ino=16374 res=1 [ 391.832922][T19077] IPVS: ftp: loaded support on port[0] = 21 21:13:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) preadv(r2, &(0x7f0000002840)=[{&(0x7f00000003c0)=""/156, 0x9c}, {&(0x7f0000000480)=""/4085, 0xff5}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000001480)=""/178, 0xb2}, {&(0x7f0000002900)=""/102400, 0x19000}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/204, 0xcc}, {&(0x7f0000002640)=""/247, 0xf7}, {&(0x7f0000002740)=""/196, 0xc4}], 0x9, 0x2) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r3, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c90667e5f00010006"], 0x3c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 391.897419][ T26] audit: type=1804 audit(1589836383.417:430): pid=19078 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir923980106/syzkaller.xuR3EN/140/cgroup.controllers" dev="sda1" ino=16371 res=1 21:13:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) unshare(0x0) sendto$inet6(r0, &(0x7f0000000080)="fbc67b4a8a04a5d023a2ca5583094aac6ceb8da7fc6e24acc81a458eb731beaa249aca7723a5", 0x26, 0x4004000, &(0x7f0000000000)={0xa, 0x100, 0x201, @private1={0xfc, 0x1, [], 0x1}}, 0x1c) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x453, 0x811, 0x70bd2d, 0x25dfdbfe, "97ec676ec0d7b7e0918cf788eddd4512c80b3753c690a3c352f1bea51d", ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000045}, 0x24008000) r1 = socket(0x21, 0xa, 0x96d0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_EVENT={0x8, 0x2c, 0x5}]}, 0x30}}, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x101, &(0x7f00000000c0)=0x4) shutdown(r0, 0x2) [ 392.034491][ T26] audit: type=1804 audit(1589836383.417:431): pid=19085 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir923980106/syzkaller.xuR3EN/140/cgroup.controllers" dev="sda1" ino=16371 res=1 [ 392.035186][T19072] IPVS: ftp: loaded support on port[0] = 21 [ 392.103901][T19186] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 392.251263][ T26] audit: type=1804 audit(1589836383.537:432): pid=19111 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/96/memory.events" dev="sda1" ino=16367 res=1 [ 392.312370][T19194] bond6: (slave vlan2): Opening slave failed [ 392.348324][ T26] audit: type=1804 audit(1589836383.537:433): pid=19121 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/96/memory.events" dev="sda1" ino=16367 res=1 [ 392.583988][T19186] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 21:13:07 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5451, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x4c050}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000001800dd8d13840a5d40000000020010002000fe020000000008000400", @ANYRES32=r3], 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}]}, 0x1c}}, 0x0) r8 = socket(0x10, 0x803, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r5, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="20002abd7000fddbdff9cb8da5e006000000bebf185f78acfb995f3925122059b51d37a6eec039af1f868138518a37307399d16bb361c7aa24b4dd84c2519dfb8e7c227a2531e3e8d39f5b8de8fea19ae7471a8b57f507f85bc7f04eb30c373109cbea0a7aac8e8653dca3586c28ba548862c62d62d7812c3941dde801f05b223631dc00c8c5d194", @ANYRES32=r10, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x25c4eb3730799359) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r11}}, 0x20}}, 0x0) 21:13:07 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000040)=0x9c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r4, 0x5838, 0x3, 0x7, 0x7883, 0x7f}, &(0x7f0000000080)=0x14) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000300)={{0x2, 0x4e21, @local}, {0x6}, 0x30, {0x2, 0x4e24, @empty}, 'xfrm0\x00'}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000002980)=[{&(0x7f0000000140)="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", 0x122}, {&(0x7f0000000640)="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", 0x19f}, {&(0x7f0000000280)="a45d4e26c6fadcbd663ccd6c0aca006b802c18d131b5427b3d4515dee8f10570a5923f3f543435278f94c3f8f0d4c35488ecfb1bd630b2e1e0e4247bb44938f03d603b27e44942ddcd3f11f086e6bf39ab074b690284b6d6aff6cc1e736b32f7d781c315bad312c6e8227aa050589d2e5f", 0x71}], 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f656bb967481241ba7860035cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b027511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 21:13:07 executing program 0: r0 = socket(0x10, 0x80000, 0x4000) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x38, r2, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'macvlan1\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x2, 0x70bd28, 0x25dfdbff, {{}, {}, {0x14, 0x18, {0x0, @bearer=@l2={'ib', 0x3a, 'vlan0\x00'}}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x2000c010}, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000000)=0xd10, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvmmsg(r3, &(0x7f0000001640)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2000, 0x0) 21:13:07 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5450, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 395.252619][T19265] tipc: Enabling of bearer rejected, already enabled [ 395.292269][T19267] IPVS: ftp: loaded support on port[0] = 21 [ 395.298315][T19268] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 395.375862][T19270] tipc: Enabling of bearer rejected, already enabled [ 395.387375][T19275] IPVS: ftp: loaded support on port[0] = 21 21:13:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061104c000000000084000000000000009500000000000027"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/190, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd06, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r0 = socket$netlink(0x10, 0x3, 0xe) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r3, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmmsg$sock(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000500)="54192e329731d3266c22e3b0c99802d8820bb4d7e6418608e8f984831d231e223745cea04e27917789482c63b85c104430858602b775ba1029736adfecb20239bd4cca438245d016f08ee1840bd7a0d754d413bb263e76a1fe3c2fcb4f0d2c008331935df267682e2fc5941c0b8e6e98906613330ba927bc6e92a962d43e504c04f6f0451511b3", 0x87}, {&(0x7f00000005c0)="90df3e04f01d0a5fc98bfdcdecdfbdd48f52e9103c2b6dc33cdc60e3b82ff329b26bb5a403edf11d0f2e52af9cdcadabee0f34d063821835c434d89b66c3f8955484ab3e07c9116275a29915a161de3f8785c10c2bbc7799e9e41d5e5834ade3a94807cd81257b8e18094eb77c2d437dc1678e53e111e796f4cac54b524d64b30e77d84efc82e80a37785f75a737782b96cf91682585ef31179abb67ebce58b6709194aeec83b80a66ea672cebee86859d30c4924d82ad0e8375dd54239d6b48172259faa2cbc2fe689619566284b3a945e9", 0xd2}, {&(0x7f0000000ec0)="bc9ef316fd4435f194d87ebf31e6df297d9e52e6a2dc1becda8381d021e5adf82350466dcc", 0x25}], 0x3, &(0x7f00000006c0)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x18}}, {{&(0x7f0000000700)=@l2tp6={0xa, 0x0, 0x2, @rand_addr=' \x01\x00', 0xc4, 0x3}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000780)="c10085bd8705b2bbef3e0ac3b565881d2bf030d194", 0x15}, {&(0x7f00000007c0)="b4dac7f03b0d6d0458a9ea3d53366d608fe1b1892f48de7ac266a383cd9fb2a09f132a29475469", 0x27}, {&(0x7f0000000800)="f95eca6d767bd854fc6647e95afeced01b1e55385eeff26446373a24fcd3fba8e9379a0a1e27b66d0c874d09d6bbc7c681249e2ee9608d51aa2edf5691e34f45b52ce43f2d1a8185357c36fbab70452a22be11b46b6de3cdf2033a2c0f31641ebec393bdceea978dd50b5f03a3d32aecd8f84d88ef5e3c9cf501a2388695231ccb50691907e1cb7087f667935e0d4d21df3a713034ee9ec58ce665fe030e81f6e4f131ffc8ec7dcfa7", 0xa9}, {&(0x7f00000008c0)="81d331abb17493a6e9ef01a43c5e", 0xe}, {&(0x7f0000000980)="78ecb47b99e1fadf07f334b2807a313f1759f1860bc03f7a6ccb18b174a3a2178b57e93cfb141653353da568a87446e40ddbac7dfef87975e3028e1ee1557f560b7a469836e1bf071acecfd8be4653e2d7ad31100d92d6169d3847e7a6c81c28aa4bd3c60b646b4912702a37d6167928edf10507b3c298d80b0673429cd9371913e7358abe00fe12a28f807b5c9995fa94d14163c55a36eecaf72e30238c6acc0ef25d60e6f2ea50d130dc624787e66a17fa758134662dd26f4b75cc5c912110ce90a185c2dc6be64792e97f9e4aa90608bb9eabe35ab8d0830f0eed", 0xdc}, {&(0x7f0000000a80)="e73f1e35b8d304377b873c03789a5e3e4cff916a011c6a91747024f6fb3d66eb77a75921ddc80e4f0ed5bd595badf0c67fc9fca5bee1844926caf57aba50b03ec38d99060009809d939e0a3761c996fc9cba561ae8a4922d6db5baf04fae91459f0db29b693da661723126dc3dd19aaf49d240458743ee573cb28422e551a14c68a4d832ef9713449105db420b9d0b5139549b7ba45a19c992feec371a72e3837d8096db425aea2ff968edb7fc71e5b8b1dc798ab8575db29fb2b5baa9c2b102a99c3ecba02d33d0b2c71ef394780de6699ade0e7cb51e51da423676139c6b83ba66c0e4ad1b3e845489dc58fc1a6667ddd89411c624", 0xf6}], 0x6, &(0x7f0000000c00)=[@txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x40}}], 0x78}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000c80)="542e07b3c76e6fb11e502e95da387b0bfdf9015b4109bea19331192a51fead4a71b25bfde5775ba2e5c7f628fb8b2af13b7c7021e40e4b11ae79417139b48c3263971ec7c7990b1eb13b0b19a45b1aeb856187a8bd1319d0b9630ffde48f50", 0x5f}, {&(0x7f0000000d00)="3b6fa276273587bcdf683ece5e30e637a26082e063c1955e3dafd68db15c1e8db6ae3f23dc903dd876b8716cffcfa455df8fb9c791582d14d93bd45f13fbf70b9851f13bc42b2212c0991764cd6d818d78f01594da57cd4ed832044a6eea0f069a5d", 0x62}, {&(0x7f0000000d80)="b46da519e02168644a6d6e4d2a169370ab6bc7976fb317905afc1ef4d651807bc50d1fcfc72202685bf31499b1f4ef705f97b03725c61151ca803967178f10165a8aca26e6b4d842d53bb6758e9a31866a269f8494c2ada8c681ca56937c51d74f4319f3f69537454034f151a5a7ec7f164190ab50e0cc0f3a0028c5cd18cb4d6946674d46a9b53cc836dc327c0514999d", 0x91}, {&(0x7f0000000e40)="75ab19cb3fe1809fed9334ba72f1962c1e4cf2650dcc300f2b35214024da459e63b2649854aaa188539e466dfdc89568be4c6a2cbb947f574dabdbdd33aa257c08e6de22bac0f30471d458d544f496527f9d46903ad834dc", 0x58}, {&(0x7f0000000900)="0e0571a956aff15316518f67df193c7e38b289bde5eb7795504a2c1aa3a5aece892c30120033aab466508188e030ae93130787ae21819fac7f7d", 0x3a}, {&(0x7f00000011c0)="d98f035cf550c5772c7ac1b51e159dd74ab49e8bae2a37de6af678d970be15b274fdf9abf568077f45388e1a784c4f53e0125498464ed4bac3191636851f7de4bdfa5a2a6c600a3de4bc61aadf7c4c5045803441cd880c20ced7b31e187e8b4d0ad580f8b7a93a31d5b64e1490f73d90f9eb75c5b7edb64732ae2625c938e3dbe1f752d64ea40ac07d1cfa3dd6c0282d", 0x90}, {&(0x7f0000000f80)="c425ebd06d99efdc56d4d11ac36c61ea571c760907a173d99d9052b2461fe6b7f98e6eb63f216401c9a71b479bc185ed298ea70493360feeb9659c13a37eaa296f95c15112947d5084fd8932c762faa03fcd11c76cbc7928f26ed7e3c9e3c88b5ec604a7cb719faa830ba661179af83fec411c61eaf6e1b3a77788ab4a8215532f7f07115f8e91472f36ac8e8deddf8ef5", 0x91}, {&(0x7f0000001040)="69e2b4", 0x3}], 0x8}}], 0x3, 0x8005) accept$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000480)={&(0x7f0000000200)=@deltfilter={0x248, 0x2d, 0x800, 0x70bd25, 0x2000000, {0x0, 0x0, 0x0, r3, {0x7, 0x7}, {0xc, 0x4}, {0x5, 0x1}}, [@TCA_CHAIN={0x8, 0xb, 0x1ff}, @TCA_RATE={0x6, 0x5, {0x3a, 0x4}}, @TCA_CHAIN={0x8, 0xb, 0x7fff}, @TCA_CHAIN={0x8, 0xb, 0xffffffff}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x88, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0xe0}, @TCA_ROUTE4_IIF={0x8, 0x4, r5}, @TCA_ROUTE4_FROM={0x8, 0x3, 0x34}, @TCA_ROUTE4_TO={0x8, 0x2, 0xd}, @TCA_ROUTE4_POLICE={0x64, 0x5, [@TCA_POLICE_RATE64={0xc, 0x8, 0x3}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x970000000000}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3f0f3414, 0x6, 0x1ff, 0xffffff7f, 0x20, {0x3, 0x2, 0x8, 0xfff, 0x8, 0x8}, {0x36, 0x1, 0x1, 0x45cb, 0x0, 0xbc}, 0x0, 0x8000, 0x411c}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x7fff}, @filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0x154, 0x2, [@TCA_RSVP_ACT={0x128, 0x6, [@m_csum={0x124, 0x2, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x6, 0x40, 0x7, 0x966a, 0x100}, 0x32}}]}, {0xf2, 0x6, "055fb3a4f729f7ac5db3c82cc2973c629e933c1a111ffcbb671bcd61b61e492ddd756451be73ece19f8d8217af0ce6e481a9484fce770c1090c96596d2201bc6ddc45d0ffb550360daf07169defdeeda9caee35b1fa3b8790df0c989411bccd6d41db49db8b6084c4d5205e868eb94acd27ccb38af76898e7a6e08cbbd7a25188a430225e7b34ee9093292ec2d21f27eaf45174d5422bb2648ed9fe3cc9e1d2011a32646b7687c8dc554b8cd32f46de162c1f4d1cc5ab98c90b22a77160962d63fbc5afa361ea1fd5ffca60c6cac5d482929b820b99cfb4acafe6d990620732a1756fe823fa5cf7827bca0202537"}}}]}, @TCA_RSVP_DST={0x8, 0x2, @rand_addr=0x64010101}, @TCA_RSVP_PINFO={0x20, 0x4, {{0x3ff, 0x9, 0x4}, {0x0, 0x8, 0x4}, 0x2f, 0x9, 0x40}}]}}, @TCA_CHAIN={0x8, 0xb, 0x3}]}, 0x248}, 0x1, 0x0, 0x0, 0x4010}, 0x200480c1) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r7 = socket$inet6(0xa, 0x5, 0x0) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f00000000c0)={r9, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000040)=0x9c) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000001280)={r9, @in6={{0xa, 0x4e21, 0x2, @private2={0xfc, 0x2, [], 0x1}, 0x800}}}, 0x84) 21:13:07 executing program 2: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 395.792394][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 395.792415][ T26] audit: type=1804 audit(1589836387.837:445): pid=19332 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/143/memory.events" dev="sda1" ino=16384 res=1 [ 395.827935][T19338] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 395.909178][T19268] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 395.969909][ T26] audit: type=1800 audit(1589836387.837:446): pid=19332 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16384 res=0 [ 395.990944][T19345] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 21:13:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000080)='?', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'veth0_to_batadv\x00', 0x2}) r2 = socket$netlink(0x10, 0x3, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000450000140000000000849078ac1414bbac1414aa00000000040190784bf426e600070005"], 0x2e) [ 396.110521][ T26] audit: type=1804 audit(1589836387.837:447): pid=19332 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/143/memory.events" dev="sda1" ino=16384 res=1 21:13:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x4c050}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="240000001800dd8d13840a5d40000000020010002000fe020000000008000400", @ANYRES32=r3], 0x24}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}]}, 0x1c}}, 0x0) r8 = socket(0x10, 0x803, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r5, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="20002abd7000fddbdff9cb8da5e006000000bebf185f78acfb995f3925122059b51d37a6eec039af1f868138518a37307399d16bb361c7aa24b4dd84c2519dfb8e7c227a2531e3e8d39f5b8de8fea19ae7471a8b57f507f85bc7f04eb30c373109cbea0a7aac8e8653dca3586c28ba548862c62d62d7812c3941dde801f05b223631dc00c8c5d194", @ANYRES32=r10, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x25c4eb3730799359) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r11}}, 0x20}}, 0x0) 21:13:08 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:08 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000040)=0x9c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r4, 0x5838, 0x3, 0x7, 0x7883, 0x7f}, &(0x7f0000000080)=0x14) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000300)={{0x2, 0x4e21, @local}, {0x6}, 0x30, {0x2, 0x4e24, @empty}, 'xfrm0\x00'}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000002980)=[{&(0x7f0000000140)="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", 0x122}, {&(0x7f0000000640)="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", 0x19f}, {&(0x7f0000000280)="a45d4e26c6fadcbd663ccd6c0aca006b802c18d131b5427b3d4515dee8f10570a5923f3f543435278f94c3f8f0d4c35488ecfb1bd630b2e1e0e4247bb44938f03d603b27e44942ddcd3f11f086e6bf39ab074b690284b6d6aff6cc1e736b32f7d781c315bad312c6e8227aa050589d2e5f", 0x71}], 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f656bb967481241ba7860035cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b027511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 396.254804][ T26] audit: type=1804 audit(1589836387.997:448): pid=19332 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/143/memory.events" dev="sda1" ino=16384 res=1 [ 396.286288][T19360] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 396.397253][ T26] audit: type=1804 audit(1589836388.367:449): pid=19363 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/144/memory.events" dev="sda1" ino=16381 res=1 [ 396.494553][T19267] IPVS: ftp: loaded support on port[0] = 21 [ 396.550923][ T26] audit: type=1800 audit(1589836388.367:450): pid=19363 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16381 res=0 [ 396.658091][T19275] IPVS: ftp: loaded support on port[0] = 21 [ 396.710435][ T26] audit: type=1804 audit(1589836388.367:451): pid=19363 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/144/memory.events" dev="sda1" ino=16381 res=1 [ 396.828647][ T26] audit: type=1804 audit(1589836388.527:452): pid=19379 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/144/memory.events" dev="sda1" ino=16381 res=1 21:13:09 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5452, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:09 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000001, 0x4010, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r4, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x24000000) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000240)={0x14, 0x0, 0xdaa3b002485c5b6d, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r5, 0x20, 0x70bd28, 0x25dfdbf8, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4bd}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x40}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80000000}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x10000) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r5, 0x2, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r6}, {0x8, 0x1, r7}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040094}, 0x8080) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=@newtaction={0x4c, 0x30, 0x733, 0x0, 0x0, {}, [{0x38, 0x1, [@m_vlan={0x34, 0x1, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{}, 0x1}}]}, {0x4}}}]}]}, 0x4c}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) 21:13:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000)=0xbf, 0x4) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_PHYS_SWITCH_ID={0xf, 0x24, "ee69ba953d315c35758d1c"}, @IFLA_NET_NS_FD={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="3000000013000100"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001300", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00', @ANYRES32, @ANYBLOB], 0x30}}, 0x0) ioctl$SIOCPNGETOBJECT(r1, 0x89e0, &(0x7f0000000380)=0x81) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x48, r3, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x5, 0x8, 0xfffffffb, 0x0, 0x8]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0xc001) sendto$inet6(r1, &(0x7f0000000180)="044aac2f202c5feda71e039a57a93088fdeee4afe28aac61837792741a190670ccbe1a2b00aa77a87d56a3f12c7920ad02928a5d050000000000000028480be9af82553a5c661f4110adba358afd8b5b4ef1702051e393ede2698112a1f1bdf1d0f568546ed322ab4c53545bd2cd6e48522f0c154cb3c6864d0ae921db100f1ee97a234503338f8fdf356472da0cc55548547b39000000", 0x97, 0x20000005, &(0x7f0000000080)={0xa, 0x2, 0x0, @private1, 0xfffffffd}, 0x1c) 21:13:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x90, 0x0, 0x1, 0x5, 0x0, 0x0, {0x3, 0x0, 0x1}, [@CTA_ID={0x8, 0xc, 0x1, 0x0, 0x3}, @CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast1}}}]}, @CTA_NAT_SRC={0x40, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @dev={0xfe, 0x80, [], 0x13}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x2}, @CTA_MARK={0x8}, @CTA_LABELS={0xc, 0x16, 0x1, 0x0, [0x0, 0x400]}]}, 0x90}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_DELSET={0xfffffefd, 0xb, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x48}, 0x1, 0x0, 0x0, 0x400a880}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="3000000013000100"/20, @ANYRES32=0x0, @ANYBLOB="00000000ade3e43d08001300", @ANYRES32=0x0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x30}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x38, r3, 0x1, 0x0, 0x0, {{}, {}, {0x1c, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'macvlan1\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4374800c737f2604}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x1, 0x70bd2a, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xabf9f0bf848b2364}, 0x2) 21:13:09 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5451, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 397.746654][ T26] audit: type=1804 audit(1589836389.787:453): pid=19446 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/145/memory.events" dev="sda1" ino=16378 res=1 [ 397.797198][T19454] tipc: Started in network mode [ 397.803097][T19450] IPVS: ftp: loaded support on port[0] = 21 [ 397.825420][T19454] tipc: Own node identity aaaaaaaaaa34, cluster identity 4711 21:13:09 executing program 3: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'rose0\x00'}) syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @link_local={0x6, 0x80, 0xc2, 0x21, 0x0, 0x3}, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, "008000", 0x0, "4265fc"}}}}}}, 0x0) [ 397.866526][ T26] audit: type=1800 audit(1589836389.787:454): pid=19446 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16378 res=0 [ 397.871001][T19454] tipc: Enabled bearer , priority 0 [ 397.896781][T19457] IPVS: ftp: loaded support on port[0] = 21 21:13:10 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:10 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xbd601000) close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) 21:13:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000dc0)="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", 0x1000) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x4e21, 0x0, 0x0, 0x190}, {0x1c993630, 0x1000, 0x7, 0x0, 0x3}}, {{@in6=@remote}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@empty, 0x4e20, 0x0, 0x0, 0x5, 0x0, 0x80, 0xa0, 0x87}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe996}, {0x7fff, 0x0, 0x0, 0x1}}, {{@in=@empty, 0x4d3, 0x2b}, 0x0, @in=@empty, 0x34ff, 0x0, 0x0, 0x0, 0x4}}, 0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}, {0x401, 0x5, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6}, {0xfffffffffffffff7}, 0x6, 0x6e6bba, 0x0, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x3f}}, 0x0, @in=@broadcast, 0x3503, 0x4, 0x0, 0x0, 0xffffffff, 0xfb2f}}, 0xe8) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000004c0)={0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @broadcast}]}) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x5452, &(0x7f0000000080)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000180)={0x89, @local, 0x0, 0x0, 'rr\x00', 0x1, 0x0, 0x17}, 0x2c) bind$bt_hci(r1, &(0x7f0000000380)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x6) recvmmsg(r1, &(0x7f0000000600), 0x204083acb88ff8b, 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000500)={{0x0, 0x1, 0xf0, 0x3a0, 0x282, 0xb, 0x2b7, 0x1}, "", [[], [], [], [], [], [], [], []]}, 0x820) 21:13:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="34000000100005070000fa00000000000000001a", @ANYBLOB="9455983d1161b6bee617bec380b37197214c7c292b4707ccdda8eb1063ae21003a6c269304e742675f9d4f23efcf1ef81e42b138e2d037b8d4e2c5553646d948580101b6", @ANYRES32=r1, @ANYBLOB="580f698c83e609b221e6644c1340c7bb6f86208d6e0ca2c895694d211e9ab475c42b2e5d2dbe4b07fe5d1f4b1511a7853f78a53805e9fda0255b68037eb4ceff06a3aa23aa684b5b40fbcda8aabcc7de3813b1b81466d1f54685f7d6410f7835d681ffce0e9d8f72cb22a18ea1d82a0059229fbb4a3dfeacd4c295b285c8099df2b0d02310f25684ba37ad1bad264c20df4eccbdec35d14454bcf67d95eaf16b379c783b55f00d0456541a4649732fe6bfd71615d2163d05c42eba"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="44000000100081050000000000507291450938a8", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000b0001006970766c616e00000c000200060001000200000008000500", @ANYRES32=r2], 0x44}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x4924b68, 0x0) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000011000d04000000000000000010000000", @ANYRES32=r6], 0x20}}, 0x0) [ 398.333791][T19500] IPVS: ftp: loaded support on port[0] = 21 [ 398.392758][T19518] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 398.515722][T19519] IPVS: set_ctl: invalid protocol: 137 172.20.20.170:0 21:13:10 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 398.703771][T19522] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 398.916173][T19455] IPVS: ftp: loaded support on port[0] = 21 [ 398.956668][T19457] IPVS: ftp: loaded support on port[0] = 21 [ 398.978851][T10251] tipc: 32-bit node address hash set to aaaa9e00 [ 399.155572][T19500] IPVS: ftp: loaded support on port[0] = 21 21:13:14 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5460, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='io.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000640)=ANY=[@ANYBLOB='&'], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x4, 0x0, &(0x7f0000000080)) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000000)=0x1000, 0x4) 21:13:14 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0x100000001) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r5 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x0, 0x200}, [@IFLA_PROTO_DOWN={0x0, 0x27, 0x9}, @IFLA_NET_NS_FD={0x8}]}, 0x4}}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r5, 0x28, 0x1, &(0x7f0000000100)=0x7fffffff, 0x8) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r8 = accept$alg(r4, 0x0, 0x0) sendfile(r8, r3, 0x0, 0x80000001) 21:13:14 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:14 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5452, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:14 executing program 3: r0 = socket(0xa, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000180)={0x2, 'ip_vti0\x00'}, 0x18) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@ipv4_newrule={0x48, 0x20, 0x800, 0x70bd26, 0x25dfdbfc, {0x2, 0x0, 0x10, 0xff, 0x2, 0x0, 0x0, 0x4, 0xc}, [@FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'sit0\x00'}, @FRA_SRC={0x8, 0x2, @multicast1}, @FRA_DST={0x8, 0x1, @multicast2}, @FRA_GENERIC_POLICY=@FRA_TABLE={0x8, 0xf, 0x4}]}, 0x48}}, 0x0) r5 = socket$inet6(0xa, 0x5, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) setsockopt$PNPIPE_INITSTATE(r7, 0x113, 0x4, &(0x7f0000000080)=0x1, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={r8, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000040)=0x9c) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={r8, 0xd9}, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'team0\x00'}, 0x18) [ 402.687083][T19659] IPVS: sync thread started: state = BACKUP, mcast_ifn = ip_vti0, syncid = 0, id = 0 [ 402.708683][T19657] IPVS: stopping backup sync thread 19659 ... [ 402.728157][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 402.728171][ T26] audit: type=1804 audit(1589836394.767:463): pid=19652 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir923980106/syzkaller.xuR3EN/146/cgroup.controllers" dev="sda1" ino=16376 res=1 [ 402.772829][T19658] IPVS: ftp: loaded support on port[0] = 21 21:13:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @window={0x3, 0x7}, @sack_perm, @timestamp, @window={0x3, 0xfff}], 0x6) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000640)="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"/611, 0xfffffffffffffd5f, 0x40010, 0x0, 0x0) close(r0) [ 402.803414][T19665] IPVS: ftp: loaded support on port[0] = 21 [ 402.820284][T19670] IPVS: sync thread started: state = BACKUP, mcast_ifn = ip_vti0, syncid = 0, id = 0 [ 402.821831][T19669] IPVS: stopping backup sync thread 19670 ... [ 402.923623][ T26] audit: type=1804 audit(1589836394.827:464): pid=19663 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir923980106/syzkaller.xuR3EN/146/memory.events" dev="sda1" ino=16379 res=1 21:13:15 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_DYING(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x101, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x14}}, 0xd4) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r3, &(0x7f0000000400)=[{&(0x7f0000000080)='?', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) sendfile(r2, r1, 0x0, 0x100000001) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="3000000013000100"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001300", @ANYRES32=0x0, @ANYBLOB="5f5cb9fdb750c052294c25cfae0e897fa14fb7", @ANYRES32, @ANYBLOB], 0x30}}, 0x0) setsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f0000000000)=0x809e, 0x4) 21:13:15 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 403.146177][ T26] audit: type=1800 audit(1589836394.827:465): pid=19663 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=16379 res=0 21:13:15 executing program 4: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305839, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) bind$phonet(r1, &(0x7f0000000200)={0x23, 0x0, 0x3, 0x7}, 0x10) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x25dfdbfe, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) getpeername$tipc(r2, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10) [ 403.338309][ T26] audit: type=1804 audit(1589836395.377:466): pid=19730 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/103/cgroup.controllers" dev="sda1" ino=16368 res=1 21:13:15 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:15 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="d800006848bdcc39ae210700020101020000000000022b00000002000001140005800f0001006e657462696f732d6e7300001800"], 0xd8}}, 0x0) [ 403.739385][T19741] IPVS: ftp: loaded support on port[0] = 21 [ 403.958237][T19665] IPVS: ftp: loaded support on port[0] = 21 [ 404.033083][T19658] IPVS: ftp: loaded support on port[0] = 21 [ 404.177941][T19741] IPVS: ftp: loaded support on port[0] = 21 21:13:16 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:16 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0xb, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0xfffffffe}]}, 0x10) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000535a7d86faa108004500001c0000000000119078ac1c14bbac1414aa00004e20e607907886ff14f7f1a7b53bccfc5c"], 0x0) 21:13:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = socket(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = gettid() sendmsg$netlink(r4, &(0x7f0000004800)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)={0x18, 0x69, 0x11, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @pid=r5}]}, 0x18}], 0x1}, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x11, 0x6, 0x101, 0x70bd2a, 0x25dfdbfd, {0xc, 0x0, 0x7}, [@typed={0x4, 0x49}, @nested={0x18, 0x66, 0x0, 0x1, [@typed={0x8, 0x2e, 0x0, 0x0, @pid=r5}, @typed={0xc, 0x77, 0x0, 0x0, @u64=0xe5de}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x20000044) sendfile(r3, r2, 0x0, 0x100000001) 21:13:16 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x54e3, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 405.018996][T19843] IPVS: ftp: loaded support on port[0] = 21 [ 405.045536][ T26] audit: type=1804 audit(1589836397.087:467): pid=19844 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir516100174/syzkaller.xn1nMe/161/cgroup.controllers" dev="sda1" ino=16375 res=1 [ 405.629058][T19843] IPVS: ftp: loaded support on port[0] = 21 21:13:18 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x5460, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:18 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000196000/0x4000)=nil, 0xc07000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff5d, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001985680c1ba3a20400ff7e280000005e00ffffba162441caf0da3b40c925234476d0b80ca0aa1c0009b3ebea8653b1cc7e6397", 0x4c}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00', 0x10}, 0x2c) socket$isdn_base(0x22, 0x3, 0x0) r3 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'none\x00'}, 0x2c) r4 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast1, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r5 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000140)={0x6, @multicast2, 0x0, 0x0, 'none\x00', 0x0, 0x1, 0x7f}, 0x2c) 21:13:18 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0xb, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0xfffffffe}]}, 0x10) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000535a7d86faa108004500001c0000000000119078ac1c14bbac1414aa00004e20e607907886ff14f7f1a7b53bccfc5c"], 0x0) 21:13:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000025000511d25a80648c63940d0424fc60040010000a0003000200000037153e370a00098002000000d1bd", 0x2e}], 0x1}, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r4, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0xffffffff, {0x0, 0x0, 0x0, r4}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) write$binfmt_elf32(r1, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xa7, 0x89, 0x3, 0x7, 0x2, 0x3e, 0xffffff83, 0x286, 0x38, 0x143, 0x6, 0x9c2c, 0x20, 0x1, 0x1f, 0x0, 0x8001}, [{0x2, 0x0, 0x2, 0xfff, 0x0, 0x7f, 0xce, 0x4d}], "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", [[], [], [], [], [], [], [], [], [], []]}, 0x1a58) 21:13:18 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:18 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x6364, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x6, 0x2}, 0x0, 0x0, &(0x7f0000000240)={0x1, 0xe, 0xfcc, 0x20}, &(0x7f0000000280)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4}}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000004c0)=""/192, &(0x7f0000000580)=0xc0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r2, 0x4) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000740)={0x1, 0x2, 0x1000, 0x31, &(0x7f00000005c0)="bf0531f16dbd45b95e5c2db827f66164938dfad08e870a5adaaa6da4563e8ba1453c0d42447ee9bdc5cde005576f3a0650", 0xab, 0x0, &(0x7f0000000680)="e827615a45af5f63015c0d8d79229d7e3335a663c085cdb87357005c4c16c5ed1bdfd6eeb3f56e34cde28dd5b2229fb62f89fb4b585fa2fe2286151a6b61478a8fb379b563ac67c7fb61cf616763cd7c44812ff146c1278aee55de5ef106e9e6a481d5846991ddac0df23beb495082f1bd7c9d5eb63d8b86a1f450f5c02022bd82b2ca300499db6b2d97a187abe18bf10efabbe000d807d62b1e3c029bf2795aed4b23f6cc87d675a63e7c"}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) accept4(0xffffffffffffffff, &(0x7f0000000880)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000600)=0x80, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r5, 0x1b, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}]}, 0x1c}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f0000000640)=0x11, 0x4) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0], 0x17) pwrite64(r3, &(0x7f0000000100)="c67043d40781fd58e1a336d9c28a15cb751920c06e90c0ae0fb51b2f488d5b2c4e4dbd6ec111a845b13da9fdbadc7cc4a95dfb30eda3727e6ad30331abf450047769cbeeb4dad14968cba2b6bc188fbef73421d6ff52c25f0faace408dbf7ad1ef4bae7a2b6d3576b678", 0x6a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x3fe00) accept4$ax25(r0, &(0x7f00000007c0)={{0x3, @rose}, [@null, @remote, @remote, @null, @netrom, @remote, @default, @rose]}, &(0x7f0000000840)=0x48, 0x0) [ 406.816424][T19909] IPVS: ftp: loaded support on port[0] = 21 [ 406.826205][T19913] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 406.882902][T19918] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 406.921169][T19917] IPVS: ftp: loaded support on port[0] = 21 21:13:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000900)={@mcast2, 0x20, r5}) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@gettclass={0x24, 0x2a, 0x400, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0xb, 0x8}, {0xc, 0x3}, {0x8, 0xa}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000050) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f0000000040)=0x80) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000540)={'veth1\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x4c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0x4, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa, 0x1, 'netem\x00'}, {0x1c}}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc800}, 0x40010) [ 407.138570][T19940] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! 21:13:19 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 407.233109][T19940] File: /root/syzkaller-testdir923980106/syzkaller.xuR3EN/150/memory.events PID: 19940 Comm: syz-executor.4 21:13:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000010001fff4c00"/20, @ANYRES32=0x0, @ANYBLOB="5b00000000000036746e6c000010000280040013365e7402bbc88e0005000900290000"], 0x40}}, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000400)={0x0, 'geneve1\x00', {0x3}, 0x80}) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x70bd28, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r4, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x20, 0x0, 0x2, 0x202, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'Q.931\x00'}]}, 0x20}}, 0x50011) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd2f5e3103"], 0xa) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x34, r5, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x34}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="200027bd7000fedbdf250400000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f0eb238967bba32168c730d4b4bb46a04fda5f5bc"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xbc, r5, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5b}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x59}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6edd}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x32}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x5840}, 0x8001) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000440)={r0}) setsockopt$SO_J1939_FILTER(r6, 0x6b, 0x1, &(0x7f0000000480)=[{0x0, 0x2, {0x1, 0xf0, 0x3}, {0x0, 0x1, 0x3}, 0x0, 0x1}, {0x0, 0x3, {0x1, 0x0, 0x3}, {0x0, 0x0, 0x2}, 0x1, 0xfd}], 0x40) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x0) recvmsg$kcm(r2, &(0x7f00000002c0)={&(0x7f0000000040)=@x25, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)=""/167, 0xa7}, {&(0x7f00000001c0)=""/167, 0xa7}], 0x2, &(0x7f0000000340)=""/160, 0xa0}, 0x40002000) 21:13:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x10000, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x6, 0x2}, 0x0, 0x0, &(0x7f0000000240)={0x1, 0xe, 0xfcc, 0x20}, &(0x7f0000000280)=0x200, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x4}}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000004c0)=""/192, &(0x7f0000000580)=0xc0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r2, 0x4) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000740)={0x1, 0x2, 0x1000, 0x31, &(0x7f00000005c0)="bf0531f16dbd45b95e5c2db827f66164938dfad08e870a5adaaa6da4563e8ba1453c0d42447ee9bdc5cde005576f3a0650", 0xab, 0x0, &(0x7f0000000680)="e827615a45af5f63015c0d8d79229d7e3335a663c085cdb87357005c4c16c5ed1bdfd6eeb3f56e34cde28dd5b2229fb62f89fb4b585fa2fe2286151a6b61478a8fb379b563ac67c7fb61cf616763cd7c44812ff146c1278aee55de5ef106e9e6a481d5846991ddac0df23beb495082f1bd7c9d5eb63d8b86a1f450f5c02022bd82b2ca300499db6b2d97a187abe18bf10efabbe000d807d62b1e3c029bf2795aed4b23f6cc87d675a63e7c"}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) accept4(0xffffffffffffffff, &(0x7f0000000880)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000600)=0x80, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r5, 0x1b, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}]}, 0x1c}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f0000000640)=0x11, 0x4) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=0x0], 0x17) pwrite64(r3, &(0x7f0000000100)="c67043d40781fd58e1a336d9c28a15cb751920c06e90c0ae0fb51b2f488d5b2c4e4dbd6ec111a845b13da9fdbadc7cc4a95dfb30eda3727e6ad30331abf450047769cbeeb4dad14968cba2b6bc188fbef73421d6ff52c25f0faace408dbf7ad1ef4bae7a2b6d3576b678", 0x6a, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x3fe00) accept4$ax25(r0, &(0x7f00000007c0)={{0x3, @rose}, [@null, @remote, @remote, @null, @netrom, @remote, @default, @rose]}, &(0x7f0000000840)=0x48, 0x0) 21:13:19 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 407.788607][T20004] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 407.829114][T20004] File: /root/syzkaller-testdir923980106/syzkaller.xuR3EN/151/memory.events PID: 20004 Comm: syz-executor.4 [ 407.851587][T20017] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 407.879360][T20017] File: /root/syzkaller-testdir923980106/syzkaller.xuR3EN/151/memory.events PID: 20017 Comm: syz-executor.4 [ 408.000551][T19915] IPVS: ftp: loaded support on port[0] = 21 [ 408.087939][T19923] IPVS: ftp: loaded support on port[0] = 21 [ 408.393309][T19999] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 408.407186][T19913] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 408.446671][T20033] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 408.466332][T19918] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 21:13:23 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x6364, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:23 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:23 executing program 4: write$tun(0xffffffffffffffff, &(0x7f0000000180)={@void, @val={0x0, 0x1}, @ipv4=@generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast1}}}, 0x1e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'xfrm0\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x5, &(0x7f00000000c0)=0xd0, 0x4) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa8100000086dd60"], 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') r7 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @local}, &(0x7f00000000c0)) sendmsg$BATADV_CMD_GET_GATEWAYS(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)={0x1c, r6, 0x711, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r6, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1000000}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xc18}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xcc9}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x401}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000081}, 0x40000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 21:13:23 executing program 0: r0 = socket$inet6(0xa, 0x802, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000580), 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f00000015c0)=ANY=[@ANYBLOB="8100635b36dd2f5e3103"], 0xa) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfef0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x34, 0x0, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffe00}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x34}}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="200027bd7000fedbdf250400000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f0eb238967bba32168c730d4b4bb46a04fda5f5bc"], 0x3}, 0x1, 0x0, 0x0, 0xc0}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002bbd7000fddbdf25040000000c000380080005006401010114000380080005000a010100060007004e2000002800038014000600000000000000000000000000000000000500080006000000080001000200000008000400070000000800060007000000080004a9106d2f423499de8e1b96fb6331fdbb87d7e3db5f097bea1bef313bb5e4a1429cd025e3ae1bfaa440d0ce0bf9171c131b8dd30de2d51d6b8ea55957194cbea9e4b9df5f3eeaac5166eef489df205a6df28e56ed8ce0f8b6316e7de52f25b7ff348ace20111231712da48de32fd48791bdeeb2bfa6382896601f089613646b97fe143866d75824818b8c00092a33e8c0c5c65734ddc05b0788d652375026c1438b0d74927889730f1ff8e78b2747e0736b293ecb10c8a1c3871d66"], 0x74}}, 0x40000) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000180)={0x4, {{0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}}, {{0xa, 0x4e24, 0x4d, @mcast2}}}, 0x108) setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000340)=0x8001, 0x2) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) accept$alg(r4, 0x0, 0x0) 21:13:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f00000002c0)=0x24f) r2 = socket(0xa, 0x1, 0x0) close(r2) accept4$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r1, 0x20000}, &(0x7f0000000040)=0x8) sendmmsg$inet_sctp(r2, &(0x7f0000000bc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000400000000000000100000000000000000000000b2bbcc70d6a0e18846efe9f1c7447b895f6c5e221dcbd97ef1e341168cc5c1603689157de8ce600e9c11b8f530bb34dcf75f96eaf667fcdeee4c19c3c3743d7fd2aaac376f565d28ea75fcbecdcafd3539b099e9a0615bf6068e490a38", @ANYRES32=0x0], 0x30}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000300)={0x1, [0x0]}, &(0x7f00000002c0)=0x24f) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) 21:13:23 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x660c, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 411.517517][T20095] IPVS: ftp: loaded support on port[0] = 21 [ 411.625331][T20108] IPVS: ftp: loaded support on port[0] = 21 21:13:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r3 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000340)={'filter\x00', 0xed, "753530e691b8f88bfec4ea8ed08c144089492d65355d3608872519810e2366ca75e385f505edf860f967266e162c89ad9442dec5055324e2d7f96f9eaba1811c249d00a913ffc82a85894a5dbe16d37aa79d7c2b96c0671aec42129e5ff7f0c72a2123cf5b4fb40ecbcbbd6255d0202bf82dea7b65e94109069077b1e47e63fce1b4357b88ba35fb2ca6cb7013dfe8fa8ac9b5ff90c3f22a605d44fe77f7dcb0c870e3af132ecdbb5245bfffa6d7f0d917a35320736fafe17d192d4992cf99b827eeb3a6746c89bd82971e9293e6e9091389bb74953073261f2e343843f7e9d1b9571e685334205679266e7164"}, &(0x7f0000000040)=0x111) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x20, r2, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY_TXQ_PARAMS={0x4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x20}}, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendfile(r0, r1, 0x0, 0x1) 21:13:23 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:23 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x3, 0x4) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r4 = socket$inet6(0xa, 0x5, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000040)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000340)={r6, 0x50, &(0x7f00000002c0)=[@in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e21, @rand_addr=0x64010100}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e22, @rand_addr=0x64010100}]}, &(0x7f0000000380)=0x10) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x20, 0x0}, @in=@loopback}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000001}, {0x0, 0xfffffffffffffffa}}, {{@in=@broadcast}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, 0xe8) write$tun(r1, &(0x7f00000000c0)={@void, @val, @mpls={[], @ipv4=@icmp={{0xa, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x1, 0x0, @multicast2, @remote={0xac, 0x14, 0x8}, {[@timestamp_addr={0x44, 0x14, 0xb, 0x1, 0x0, [{@local}, {@loopback}]}]}}, @timestamp={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}}, 0x46) [ 412.010222][T20159] IPVS: ftp: loaded support on port[0] = 21 [ 412.034509][ T26] audit: type=1804 audit(1589836404.077:468): pid=20154 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/109/cgroup.controllers" dev="sda1" ino=16377 res=1 21:13:24 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x46, 0x0, &(0x7f0000000100)="4d50b441e692763513ef874565580000ff0d00000000122e25d386dd227dcb6470faa27ed2a0ff3862c8112b9bd19802e274d7b70fe661176f27007b9631b3a0291d70d5f32d", 0x0, 0x3fb, 0x0, 0x66, 0xffffff02, &(0x7f0000000000), &(0x7f0000000380)="7045502c9fe7d72a5d725d07000000840c0fa18b214f01adde5b220866f34723aefcc876df83a6915a0a9aed8abea8fce9dca40354f218178eedfd571140c75e8aaafa38e2ecaa6ebfc27f5dc7301c0b85450d3cfc4ceee8968d0ab47f1d829da06a01f82ec4f14d3c692a59db27ece44a0e029488462d11e930e90d5deafb1b5af71d3cd3c053aa34bc8d000000"}, 0x40) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) getsockopt$packet_int(r2, 0x107, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:13:24 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r9, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000780)={0x548, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8}, {0x100, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x100}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r3}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r3}, {0x1e8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x44, 0x4, [{0x8, 0xff, 0x9, 0x7}, {0x200, 0x0, 0x6}, {0x8, 0x7f, 0x9f, 0x26}, {0x100, 0x0, 0xfe, 0x4}, {0x6, 0x2, 0x6}, {0x5, 0x8, 0x5, 0x81}, {0x7bf4, 0x95, 0x6, 0x4}, {0x1ff, 0x40, 0x93, 0x2}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1f}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0xfff, 0x0, 0xff, 0x3ff}, {0xdbd, 0x8, 0x7, 0x20}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r3}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x168, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xd1}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x85f4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x548}, 0x1, 0x0, 0x0, 0x11}, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="17010000000000001c0012000c000100626f6e64000000000c000200080001f5030000008626ed91be4e14e30f8eb30686d38760ca9003461d65ffecf7b8e666376cbd8a8c7524f30194f458b03837c412eba5d1e889db1e111238bed62b2b3d2b0b7692d2281c"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=@newlink={0x58, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @loopback}]}}}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_PROMISCUITY={0x8}]}, 0x58}}, 0x0) [ 412.682884][T20108] IPVS: ftp: loaded support on port[0] = 21 [ 412.699852][T20095] IPVS: ftp: loaded support on port[0] = 21 [ 412.743442][T20210] IPVS: ftp: loaded support on port[0] = 21 [ 413.431652][T20210] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 413.498133][T20210] device bond0 entered promiscuous mode [ 413.504978][T20210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 413.522979][T20213] bond0: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 413.535453][T20213] bond0: (slave ip6tnl1): Error -95 calling set_mac_address [ 413.677565][T20210] IPVS: ftp: loaded support on port[0] = 21 21:13:25 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:25 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x660c, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:25 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140)=0x8000007fffffff, 0x12) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000100)=0xaf12, 0xfffefffd) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="a47155185a772868632faaa1763b04b143c8e7f5b9efb4ab74163a4d2902dad379c55afba2e5f336825489fd74c81c5e183e65fa15bf209584c4774bbb02a5938769621688b1bc663f2ba6efa4e5a921a2e045672a324bde7770b22deb3f530ef13f7a60b44d0b0503d5a387270612a58b706d69b1d84c63aa68d251cd55b44cfb84ee2be8770124d0a0aa47290a10c3a1bdcab46a06f5559ec4edac5619972ff3da7edd79ae2dba27017c87e81584be4f7aeec43fcd0ab52c14bd8a1561c31e38608f65201f9b3148e8"], 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESHEX=r1, @ANYRES16, @ANYBLOB="f9e8565aadf8d6baf4a2372cbb7e56c87fe8b609fbbf8d7ef22e09612ce25a5f1060e2d5bc047d4566ab5b4d797ed8c19a059c0da03757346aaa840017d7dd529d881fb9"], 0xfef0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, 0x0, 0x4000041) syz_genetlink_get_family_id$tipc2(0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000180)}, {&(0x7f0000000240)="5c8aae08aad2f771ad89190786df5a84d36e244413efbf1a999a7bbdbe170f51bccb2254542cf4a4bc0cc91f324c9e52970cf208", 0x34}, {&(0x7f00000002c0)="88705c8a3b7cdfb65cafa01a1c618bbf52ff1038284024661da457eff4218ab08bff105d905d8ddc3062767b59407432f9a4c1e2d5c0a93a57d23971a728e6fb13a1343f936b96c9dc45c2bcda0207038e2b6ca14af87fc7ca3a2a14d63d0e969e91478a670b76bc1a08c20289178a", 0x6f}, {&(0x7f0000000340)}, {&(0x7f0000000640)="e95d3f462d373df306deb38bb2a39b303569931cc2bffefdbab646cdc2fb435206f9ff5db2e702b786d1be3c2ee78218ad6a380b42fe2d42ab5932a5fcd8ed78d163e2677406c3810d3eaa3c41369b6fa75b0670ada4df278b70756ac83a5531d0b07556f106858bc5d96bf2d34a02543db33840cc0d6f41c7aa9869b173a3aea0ea0fe74c4ec3a6", 0x88}, {&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00', 0x6}], 0x6) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 413.863477][ T26] audit: type=1804 audit(1589836405.897:469): pid=20313 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir923980106/syzkaller.xuR3EN/154/memory.events" dev="sda1" ino=15889 res=1 [ 414.009676][T20318] IPVS: ftp: loaded support on port[0] = 21 [ 414.020668][ T26] audit: type=1800 audit(1589836405.897:470): pid=20313 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=15889 res=0 21:13:26 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 414.220935][ T26] audit: type=1804 audit(1589836405.907:471): pid=20313 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir923980106/syzkaller.xuR3EN/154/memory.events" dev="sda1" ino=15889 res=1 [ 414.395945][ T26] audit: type=1804 audit(1589836406.117:472): pid=20313 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir923980106/syzkaller.xuR3EN/154/memory.events" dev="sda1" ino=15889 res=1 21:13:26 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140)=0x8000007fffffff, 0x12) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000100)=0xaf12, 0xfffefffd) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="a47155185a772868632faaa1763b04b143c8e7f5b9efb4ab74163a4d2902dad379c55afba2e5f336825489fd74c81c5e183e65fa15bf209584c4774bbb02a5938769621688b1bc663f2ba6efa4e5a921a2e045672a324bde7770b22deb3f530ef13f7a60b44d0b0503d5a387270612a58b706d69b1d84c63aa68d251cd55b44cfb84ee2be8770124d0a0aa47290a10c3a1bdcab46a06f5559ec4edac5619972ff3da7edd79ae2dba27017c87e81584be4f7aeec43fcd0ab52c14bd8a1561c31e38608f65201f9b3148e8"], 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESHEX=r1, @ANYRES16, @ANYBLOB="f9e8565aadf8d6baf4a2372cbb7e56c87fe8b609fbbf8d7ef22e09612ce25a5f1060e2d5bc047d4566ab5b4d797ed8c19a059c0da03757346aaa840017d7dd529d881fb9"], 0xfef0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r1, 0x0, 0x4000041) syz_genetlink_get_family_id$tipc2(0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000180)}, {&(0x7f0000000240)="5c8aae08aad2f771ad89190786df5a84d36e244413efbf1a999a7bbdbe170f51bccb2254542cf4a4bc0cc91f324c9e52970cf208", 0x34}, {&(0x7f00000002c0)="88705c8a3b7cdfb65cafa01a1c618bbf52ff1038284024661da457eff4218ab08bff105d905d8ddc3062767b59407432f9a4c1e2d5c0a93a57d23971a728e6fb13a1343f936b96c9dc45c2bcda0207038e2b6ca14af87fc7ca3a2a14d63d0e969e91478a670b76bc1a08c20289178a", 0x6f}, {&(0x7f0000000340)}, {&(0x7f0000000640)="e95d3f462d373df306deb38bb2a39b303569931cc2bffefdbab646cdc2fb435206f9ff5db2e702b786d1be3c2ee78218ad6a380b42fe2d42ab5932a5fcd8ed78d163e2677406c3810d3eaa3c41369b6fa75b0670ada4df278b70756ac83a5531d0b07556f106858bc5d96bf2d34a02543db33840cc0d6f41c7aa9869b173a3aea0ea0fe74c4ec3a6", 0x88}, {&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00', 0x6}], 0x6) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 414.557229][ T26] audit: type=1804 audit(1589836406.227:473): pid=20313 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir923980106/syzkaller.xuR3EN/154/memory.events" dev="sda1" ino=15889 res=1 [ 414.681933][ T26] audit: type=1800 audit(1589836406.227:474): pid=20313 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=15889 res=0 [ 414.779305][ T26] audit: type=1804 audit(1589836406.357:475): pid=20319 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir923980106/syzkaller.xuR3EN/154/memory.events" dev="sda1" ino=15889 res=1 [ 414.894419][ T26] audit: type=1804 audit(1589836406.427:476): pid=20372 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/159/memory.events" dev="sda1" ino=15905 res=1 [ 414.991736][ T26] audit: type=1800 audit(1589836406.427:477): pid=20372 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=15905 res=0 [ 415.190064][T20213] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 415.289378][T20389] IPVS: ftp: loaded support on port[0] = 21 21:13:28 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8901, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:28 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = getuid() ioctl$SIOCAX25DELUID(r2, 0x89e2, &(0x7f00000000c0)={0x3, @default, r3}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r4, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010003b0dfff300"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB="140012000b00010062726964676500000400"], 0x3c}}, 0x6000000) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={0x0, 0x40c}, 0x8) socket$packet(0x11, 0x0, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) 21:13:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000000)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c00)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xc}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @mcast1}]}}]}, 0x48}}, 0x0) 21:13:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x98, &(0x7f00000001c0)={@local, @remote, @val={@void, {0x8100, 0x2, 0x1, 0x1f}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "ca5700", 0x5c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x1, 0x0, 0x17, 0x40, 0x0, 0x0, 0x0, {[@fastopen={0x22, 0x12, "1faa3029d25d212923ed84e1019f5157"}, @nop, @timestamp={0x8, 0xa, 0x4, 0x3}, @generic={0x0, 0x12, "6a7afd74ad445652a716c26fb0bca864"}, @generic={0x8, 0xc, "62a8ea148340a42939b1"}, @exp_smc={0xfe, 0x6}, @window={0x3, 0x3, 0x8}]}}}}}}}}, 0x0) 21:13:28 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8901, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:28 executing program 3: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000)="99", 0x1, 0xc000, 0x0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000001640)="b8a84e6e38982e9fee488229657b2240e49ad0b8", 0x14) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="03", 0x1}], 0x1}}], 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000001680)={{0x2, 0x4e22, @loopback}, {0x6, @multicast}, 0x24, {0x2, 0x4e20, @multicast2}, 'vlan0\x00'}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) pwritev(r1, &(0x7f00000015c0)=[{&(0x7f00000004c0)="c769e52fc76dc57dbe814bdb3200dc16906321d818b84adf01214c80bbea2865931cc54631c803e9b09c9307f2d5ab24d7d364e57c0e17cf3408441c9b5153a6db7500c3acca196ca967984ba65a7716dcc4fa16f24fbb9332a1377ae039e380483fd9b847c5d284278e6b7ab7d8fd76189e402db883a0ae28baccb344f90993d593af1c765521dded56dd0e74aa69a48e36e21fd87207d66c67548bbbd0e639a9fef8ec0f54e720b40895e86c08ae71b9d1b4b240c4bb25c5728d23828b6dbb12c15ef7f3bce7abaef6169ebeb374a18a270b8f6e4eaf112bde2aee2611d17d6f7d19069ad6bb8caca9785993ccce85f22c0a69c565cc989cd325007071370a81b3f7d6aff03752ec550dc134e768730c64b0cd15828710526b153b4dfbcc95fbb9d7f29032216dc1317e901a994aa4f4fe27159bf678dcfdc6442a47353758c82d9136c868ee1d4132efce5ae7f79efd2a68b489c42e3d087fb783e269ce30cc0af6a39c49d907f6746328d043aafb37455c4cba305f10e9742f2b727e1aabe610b0f5879eafd4342f14c1f86bd12a51688e07e1c931be5c5fdbeead91072d7c26d20123ac1ac6940527b313caf534931e1958c862e0776723da1fc16c09735ef93243908f626366e426da8ff4c7501b4040e6c1aaa2d0b452da467193f0748f1dbe33d54cfc9ad2b3e05486813897e1af935437ae28698421360242408587de9f5e547d006898efa686bf84623eb9b60caced21808cc41f11e365161efdc7bb878d4f15829c1a3ec49381c25950163783ecf2075b705a75795d0588b4fc30533f72052d6102a2ddcb7e731939d30ffc8d48edc9135023a92e30b4669400be07e25a30224e41edbe535bea83be7f5f94eee30f5ce628da2843f41f12f8a83d17fc8c8e15be1a0fad7d7c22001ea3f27f4af62c049f6ee3dc794bb0124b12ada0512b3ad2fb36da26f4ab824924a8e4f2773dc551df3f4c68cc8007edf64b3e736dd6601e9ae60806d29e91f8bee322119e26ebc6303e8b1e32976bd398889de4ca5cb63be288902691604ef0db377fab713c97a5dc226902273e9b256dbbe196d99ba2a81ecfdc71190aa20af1b23f5893519e1838252d0b7dc9094bf21d507a15039faa082c3aba35afa2198bc088efc717fb9dc494c8f869b3ba9294d7bf93508a86c9c2e71d04edd2f0d1573aef5d5ea8386afafa9e7603cbefe5504354c3f463f7de00653d78b6ef659ccf070d23b8b070b2a95f9458d38ea8e650547b186ce074417d53e90ca6d30fb85c9d9c3c3f1228848d9a17d5f1a7c35738766b1f1180be95f2bcb015cb47a69809ea0fd80806b5fe01383e5add778deb175575efe81ad90e2be636c0cbf5514a97f28284cfba90917dabcf7c36fe10101269c932c294ad89760472ba32f38fd6a5c2d90572d23e806da1e4ef02800de0f808b4a57d736044c0a3b76f2ada51661aa14effaf326304899636004c39cb0f146410388bd6e22e7a9c8c11325758fe12423890bbfbc54a4cd9e08c947b213509004fa5aefaec479a5f667bd9bd3a3bca2cb86e27a4c135f12b6c3f3aef153157de188ebbb22638d293ea45fcc250512309fa6170e185786ac5854e5c1c06849996c394b007c5f34fc49d58ec54510136668bfe045fe8cfb2d8c8636aab5cc3b58df0dbaf44408a873077e35465c1fd2b4773f967fe49d1e51566de4680ad3b98c7f2f13238280440eef692b6c8fb4c6b76ea63d2f777bf36050e79b5ea074af3d50a7f105dcf4fab8c584cf858fe2eb404e91329ee984df759e1ec06e206dbe853632b31ada53ab747c7d99b85c93288dcfb2be242c53f830d0b84ef31c748b15915bcd61050fdea919c099ede318af23776af5f769c126c05babfa99d2bf086af2603ed7237a7d2ddff72ece36cfd6d88abc0e245a0c96a03628dba75e2a7f7acc29109c94ddf04ce9d8649ddfa06e39737abe059ca5e5e009f670e050d436f74840f650f8c8ea5a47fbbfeff35924422868aacaca4898717bc070ca6e6e6d9f6fadb888a28abb7cfddb6365a7db3fda5ea4f84e7af3b8425a67aaf444a1141800b675d5fdc4a37238e1cceac1c7c43a5ebaaa2a2ebd163d447ca205eaf4ba1e68f57444739f5122012b54cc4a364e79011499139e25de9c36249f4bcb036a51f23fa94e7838b09a76fac33ac7b0fc6f82b6b31e6aca672f5a2a5502970e188fecbe346bc51f026baced779407c5e3b33dde57667a1cda9ba0ed207afef43f4bc6a38430d001217dfc0edb33874d1b360b499d62cf3a448b6cc01f3fac36506212e2933428a616d21738c670cdbfd4945ab72c36dced6763acee9bf15ec0e6bf4cfc281c28845fbeb12d1bf67031f85a8053f0b2a59d9678531143720353f9394c7348599f43fe9ed9395c446e2b112916421804abf1ad6230e17a54b8cd4921533a601aa1f82cf6e6aa23d00956e1b3be27b49e2d8460fbd71eb39d430b613063a9cb167963a96012c331e7260e5b22ce493b62c17ebcedb837c60a88759f1d76cc18ed2c3698d60a6b7aeb5badc7e19198bf8deb969a16f86b62de1e713d7b8ea5ea459eaec956987586d4c76dc5872619edbbd7c87f5353383c1808a703345b2ee4346b64d5a0106072b05dda348ddcf9327dc5af86cf9cbc6d0b9145d25168ce5467b66aaec108f6886bc2c4c42014d116cf9810e6e79a662bd2f558c575e028283136bb86812436cc8f19fde45e1a32f391ed5f44bb5aabb6eeb588acfababf2b242d22cb666f81df7a41da2c83e54a97926635e434b7b4d0aa7edd95dd5236eebce2ac3e874a958f5a0526f6bc9c113ffcc097e826ed679a84b4304e29f4b478bd5707deb8f7970ea6f6775d89990e64856f11d52520839da055839dcac086d1edfd7cebbab91bad6de5c85fedc27f0a83e0e478f33db55fbf9c6fb5d8a8176ebd428f18d2f8c54624a5e2ab9c3638c01902b4dc0dc33a8b61c9817c2e7c9a6e514b38ea807ea7f4765e57200458f442725a49f10bc4afac4dc3c83c36bd7647aab6764a0dca6ff734bc9da555082beccf221d99f8eb5e091f79db54a0de493cdbde9a8c83c501fa33a8d90bf344379ea24e1147377e54b1cb734939aaf19e73c3a31ecd40ba35ef4e3bc0ceb8344811ea5e71be38368eb18bb0923c4f66888ec0388d080b6d7e35ae5a5361f0948e7dbb9a4a0feb75e696de1afbd633b8b43d687120469953f95e0ac6ac8ace7df5672e5aed7031da4b1901faefa09a0cd167f3c95da0be5e8cd7fbcb66bcb40ce89b8def9aef1cac3370563b2ee9b3282299bc8c0ddb6fad619559167e1363f05ca59c31b38aefe1ac62993007231f35f15f397cbc14eed10521a17024a43a77b80d3fc00816a2c834b28cfbed6496c061e16eb8f3100b674f9af7eb8ba9cdcf7d042341508d42792d3e05a5ea1923faf2718b6dfb74227e6222d07d3f627acacc0514945deddfbc011a02eaac1d6712386c0a0713b15797e1150f95a7c716a4341c497329ee6a0d273180840e12278698bfc854fd32b73ebefa845074b251208d4816e11f64926199512af71fc95218bcbfb47720db34224265a0cc0f49f076ac561ab7c5eba1450ae8039373a7458da91994411643efb3b9c55aec277395e4a473ce29bd9258633f2746c951440eeafb957e2a2e2239b22b8d758d21eb75c4682f6a446434c8c737f6499954a81828790a0c94007c8286f05359108d90cc2d9a76be5b41d145626eb577350def74b15995fabcbbc2cfbe65a298555bdb3715daf5c25321f65dc0c70f3767915441d52e2a46b25a238617bf51d3f851764f6cbb0b74304a09476cf9d3fc51e96ddf15292d404d8ede6c77b087785a0aa0765b54bac644081f8607443ed8d7d1de848cfbdec2bfbd37a8c9f45bee2e29632a536357d1e5eef61e0547ce746fa515909a6d5916a16da339946bccfa0403131d89b75f0dc5be584998d40dd8ea05ba4b9efa7ff9398506a5d7244923d4523bdb8daf9378160f4e8a7e753575fd2876ea1e6364bc4b31c8ffd6a8dd81aa3b51d88d68b73fc82a09981048f9a86163659439f1c0a08a8afd88b21542ccf61423160d9f9764fa143246cd9ff25e48b1279dad859e401bfbf03fc24a6a70ede1c1fc6d4cd78585abd86f032ebbddb73f0ef359af8771c03e9193cf561015a58b0554ae8aba5c0a3d4a05327a5891eb1b70bc30bbf478205538da4c9eab44210613d5871268fd58642196a12a3d8355cea170e83cc363c9541386d5a23c1a6471af9e01811f20134d0fa0d5f80a01c8374d6e2cd4eec5cd6a11748038183bb3c22fd06c9f71fd649f3d5f4abe6eb7a6216a3545f5b166218715e03aadd3a380b11c6e8fab33e32317ef03cd08b4cd31f689b2743d77e87548b68d3978f985faaf799767568a45dbbfc42a8927d3d4a1639d6a954d1d2e50935e2bea85e9c5a7bb53dc40901c7866762c4293aa28d6309d59b0bf2723e87b4e03e5f082eaee85bc470c421153c80dae54636ef99123d231f0ace802baf1a3b7d58a8a80a4490fa2b4c35b8909cbe604f768cbb5afa97a4d932dcdb8875e6c76cfc0f595d3692f7bd79e46b76a5fca01aaab48f215e052107ad52f2d1d15a91b23effc53c292df20f5b75bddff2695bfb1d44dd4d9a3bbc8c384cc2bd7d17a36d3176027dbf2634e76aa2928592f0fc6a18e6e54346a251191450989efcf8c430ba50fc226c8b25697c589f0cbf56e310d2d346986bb755f45a95a5e6df3a06ac0a90828e6d2e69510dd25cc1f5dd77b66cbc4f7ed593b10401404c07d3ba37ef968865611d7d7b4812711f44ae2eca8ece6ffe85ed3db5206e2c6c089460d7d1c0366eccdfd287c78e75052af39e7c9c8725b3608d8070ca6557fa6ddaef9c6ae2b1c4c7b3b6f241a8e059f32832bbd5ff5c3842915ac7536eeb51c299456e39db98e0e8295cdad63a0bd551d81729ecd8d50f7e42c1a47197523e4f7864bba316ce5a372f3d2141ce811f6b292b1718a271eb83189c1de145f56d35fcf552753713a6dea8f2eb11d720f8687e21eb44c0591b8b9b71dd3fab7562da0898438a0ee1d1998657038f7286762774823bde9bcdf4d458c8763c77ff25d64855971c7e2cf6083eb3d24fd473a698e8130a00b96a1122abf0a33f33db21491ecb7e8efe703dd33a11b5ae0aca376cde1dae0de4416f50dc7f941e9c72cd36a6c69f2992794d39bdf84f7c0868e0aa3bc6dec80e90c1ba9ffe3a22eed24c83b24829e46f1fb54cbf38770a40dbc09fcb96ecdf13742e0111caf0c9ebfcb22cd832679d93a7bbd59d0d0f051877ec194800a83262153a6d4b333275e22d7e13d98cf7684ce103bd679d861435b9687ad0534902da05676d75535c2c0f4eadcf8565a970c14b7c301312c76a17fd860af35c44c901f36da1754dcb1eeeb3a96e4e468de75419b6511d922e562416ec07d6a8b2ee3f9e022f9fa75eb0e165574881053579dd600a1d024ad8d1b135df183fa450b5605b7a9143fb3f0a9c973124af8b803c76bce7d148e0d80ee2c660b4391b359775e4b484758c2bcaffa2693464a24d685ee064dbdc01e910773c7e8c8d8ad771fcd911b8f113eda911ae4fbfe44173e958901f2ee9095048f44b94426129fe96a1bf9d8adf703d784a8de3935a0386826878d64c7e8d12023b0a41605aa2c0360d922da812532e7e318480817920d26868d0e21940d2fac0ebe75772b156287f8eff41913dd768ec6b3026436a6cbe2cb39ecd1a246794040c6941d501403aa8cdf98e0d8ada66365669bf", 0x1000}, {&(0x7f0000000180)="952061e2db97fd4f23052ac3058185783265bc6398f913c203c5a96366656b914cc9bc9ad6326dc0e82d3201d08174991dd8eac9e322ba202c1dc71f6adb0d921988c9063922832f0c172a9500af459bd0419591488242251f838444a0694c7da6", 0x61}, {&(0x7f0000000200)="7d3adb791b9e5076caddb69f80e93652b5bca4523d610f9d12c7e225a6559ef3e2506bc363c21db84638d2ef412d536ab3cb1f8d4984231694b20edfb8fd06df92d89c951f47", 0x46}, {&(0x7f0000000280)="c1b108106ac4d7c9b2cc12abae740841e827f9cc53af5bcbeaa161cf36e7122fbc4858e8e0f92a8b82187af5e892376b09bbdb3b989e434b00c9b5e1a9c82ccff2d9564bd1a0e29fdee414317f01bf951a0769dece4f88cf2b1a9adf7ead43820820f793f8359c5027ca2fc50632a9d7de0d7de07e47c021ff969ad6397f11de36b9b59426cf23074b85c9ecf87bdfd155e61d09de2466f9f734818a441b4d295d38525b1b7b36a7af6f4e4efacad4034ef6d282245b4ce36615707c4499714b7611ff6ce5e37b761ce23a2afd03a7be4ce3ec195e494070b7077c24ef96eeb5526b32da07b01884264babcdff594fdcf6c3532bb8e93b3bfb", 0xf9}, {&(0x7f0000000380)="2b4a84cacecd44772de1bb630864c85f1eeaadb65e64ff716e4b28b3a6b3b52223ebf295ce72fe6bc82cc114bdfe8f0be0e537d114fdbb4141711859758b68c2ea34267acc33ba72dc573cce2a71072e2b36abbf29f560d9b44a772e1e6cf7166c8a431ff0bcc89feb607c31e27e481811032ec4fc28f260fcc918b690fac5f0b0ee8a1b893536fc6e7e88515fd7ff864269a65448a277e147c59c3e", 0x9c}, {&(0x7f0000000440)="cef962bdb4d29621c6d7d8b27483d29ab8e0addb6d79bfce72bd", 0x1a}, {&(0x7f00000014c0)="a5ff935478bed05689c728383f88f345f728193626a7ffd6b6085ec9287fb9ade3ddca675cfed42932e500c404272d632bd7349aeb0e00cac3e485baa30dea3a075558c3f8945aff21919495c14a31bd7d21cb7a206febed164c7388ef745ff53f817f67af95b58b6cfee5e8a7c100e557f8f11632c0feba77f3195409bb0f118080615129982c6fa4033fe895ab24e37902d4ece500c8d988acebb779bbea146bbf904e72ad306c703206ca9d8b142afa3118a68b75cb2b47ea881b4f472c67d3434d7f002332ea0d5411d35927", 0xce}], 0x7, 0x4) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendto$inet(r2, &(0x7f0000001700)="077d7553eecacbe587a23aa5ec6532f1cf5f9f", 0x13, 0x20000010, &(0x7f0000001740)={0x2, 0x4e24, @multicast1}, 0x10) [ 416.639884][T20446] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 416.657393][T20444] IPVS: ftp: loaded support on port[0] = 21 21:13:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="54010000100013070000000000000000fe8800000000000000000000000000017f00000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0100000000000000000000000000010000000032000000ac1414bb0000000000000000000000000000000000000000000000000000551dab29e31b960a0000fbffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000b60000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c001700"/268], 0x154}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e21, 0x0, @loopback}}, 0x0, 0x0, 0x3ff, 0x0, 0xb3550aa4ba878254}, 0x9c) [ 416.694139][T20446] bond7 (uninitialized): Released all slaves [ 416.706454][T20451] IPVS: ftp: loaded support on port[0] = 21 [ 416.739712][T20457] sctp: [Deprecated]: syz-executor.4 (pid 20457) Use of struct sctp_assoc_value in delayed_ack socket option. [ 416.739712][T20457] Use struct sctp_sack_info instead 21:13:28 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 417.041881][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 417.041911][ T26] audit: type=1804 audit(1589836409.077:486): pid=20472 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/161/memory.events" dev="sda1" ino=16290 res=1 [ 417.151631][ T26] audit: type=1800 audit(1589836409.117:487): pid=20472 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16290 res=0 21:13:29 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket(0xa, 0x802, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000400)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x0, 0x3, 0x0, {0xf, 0x10}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={[], 0x2c}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x80) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830a00000016000a00", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) [ 417.306293][ T26] audit: type=1804 audit(1589836409.217:488): pid=20472 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/161/memory.events" dev="sda1" ino=16290 res=1 21:13:29 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 417.477236][T20460] sctp: [Deprecated]: syz-executor.4 (pid 20460) Use of struct sctp_assoc_value in delayed_ack socket option. [ 417.477236][T20460] Use struct sctp_sack_info instead [ 417.546018][ T26] audit: type=1804 audit(1589836409.577:489): pid=20518 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/113/cgroup.controllers" dev="sda1" ino=16242 res=1 [ 417.602544][T20446] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 417.621104][ T26] audit: type=1804 audit(1589836409.627:490): pid=20526 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/162/memory.events" dev="sda1" ino=16305 res=1 [ 417.670853][ T26] audit: type=1800 audit(1589836409.627:491): pid=20526 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16305 res=0 [ 417.707261][T20521] IPVS: ftp: loaded support on port[0] = 21 [ 417.758419][ T26] audit: type=1804 audit(1589836409.627:492): pid=20526 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/162/memory.events" dev="sda1" ino=16305 res=1 [ 417.814867][T20527] IPVS: ftp: loaded support on port[0] = 21 21:13:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x44) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) [ 417.998203][ T26] audit: type=1804 audit(1589836409.747:493): pid=20526 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/162/memory.events" dev="sda1" ino=16305 res=1 [ 418.139995][ T26] audit: type=1804 audit(1589836410.177:494): pid=20565 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/114/cgroup.controllers" dev="sda1" ino=16382 res=1 21:13:30 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8902, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:30 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x48, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000025000511d25a80648c638c0d0424fc60040010000a0003000200000037153e370a00098002000000d1bd", 0x22}], 0x1}, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x1f) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000), &(0x7f00000000c0)=0x8) syz_genetlink_get_family_id$nl80211(0x0) close(r0) 21:13:30 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8902, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:30 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) splice(r3, 0x0, r2, 0x0, 0x10000, 0x0) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x80000001}, &(0x7f0000000280)=0x8) r4 = socket(0x10, 0x80002, 0x0) r5 = socket(0x22, 0x2, 0x2) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000001a80)) syz_init_net_socket$rose(0xb, 0x5, 0x0) recvfrom$llc(r5, &(0x7f0000000880)=""/4096, 0x1000, 0x40, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3000000031003b050000000000000000000000001c00014d00180001000b591f5d75616d706c65000004000280040006eabd9fbd7fb56cbd2aced451db0659f6b6b5b533cf75d3648cb32271e5c1aaeb408f908859caa98fc25874e71362b12fd2fa3dce05fdc5034b6dadbcb527c8dbe60bbafab85b7611410b8f334e3f5f3d6fff609ffaae7010356938da77ba6d7b54e69f58861b0dd4ec1c330be1bce5097b8d1fb03e89e1d84b2337486fc133e63eb3d23d6f59600fc8a7d4edef4586cabf49862e8bfe57bac3b5b49a8200a8f9568191aef5f71445698e"], 0x30}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="44080000332f56d8c506bbf68410000104000000400000000000000000bb7146fef1f57e8aafc606000000c51b8be2f8e31310dc30bc58120ebfb2da0783cd1ddd479a4d9691480e5f4e9977671a39a679be158216b8b2d506076027e44a32fa364de465d110bc6ad3c4db5d2ea728c29c6100bb0d", @ANYRES32=0x0, @ANYBLOB="b322000000000000140012800b00010067656e65766500000400028008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x44}}, 0x0) 21:13:30 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4}}], 0x1, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000000)={0x8, 'batadv0\x00', {'team_slave_0\x00'}, 0x4}) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000074, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000080)={@remote, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@bridge_delneigh={0x58, 0x1d, 0x100, 0x70bd28, 0x25dfdbfc, {0x2, 0x0, 0x0, r2, 0x1, 0x0, 0x4}, [@NDA_DST_IPV4={0x8, 0x1, @empty}, @NDA_VLAN={0x6, 0x5, 0x2}, @NDA_PORT={0x6, 0x6, 0x4e21}, @NDA_PORT={0x6, 0x6, 0x4e24}, @NDA_DST_IPV6={0x14, 0x1, @empty}, @NDA_VLAN={0x6, 0x5, 0x3}]}, 0x58}, 0x1, 0x0, 0x0, 0x4080}, 0x20000000) syz_genetlink_get_family_id$netlbl_calipso(0x0) [ 418.749107][T20607] IPVS: ftp: loaded support on port[0] = 21 [ 418.761465][ T26] audit: type=1804 audit(1589836410.807:495): pid=20608 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/163/memory.events" dev="sda1" ino=16377 res=1 [ 418.816840][T20611] IPVS: ftp: loaded support on port[0] = 21 21:13:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0), &(0x7f0000000500)=0x4) socket$caif_seqpacket(0x25, 0x5, 0x5) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r3, r2, 0x0, 0x100000001) connect$caif(r2, &(0x7f0000000140)=@dgm={0x25, 0x9, 0x1}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x1d7) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468000000001c0002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104000000000000000002000000", @ANYRES32=r9, @ANYBLOB="08000200ffffe5bf"], 0x20}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r9}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104000000000000000002000000", @ANYRES32=r9, @ANYBLOB="0800020000000406"], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="2000000011002b0a2dbd70000000000000000000", @ANYRES32=r9, @ANYBLOB="a8216ffcb5a04b9e33239af0bd7cf77d7fd5c46f1d5bd5dfec501c4c844803dcc66efead05a09541cdb3cb36d55eba2b48c61ddc04b02af9ad6456ed95950b147e5c74a7809ce3b1930cd1674a5fafecfc759144631dc547ffe3c53d5f1b015b38a9ef449ee74973d4acd81f5be533e46113104ffdd9fb6e8de0e976026149290a7c2086867639b15008407be01d11e762ccd8b6a776fea13e17d9d8d15779905500dfc65bf09f839b555be2eee47bf7f224379d291a7ed2750e16bf1e6983d7063f2193f21fe74fcd3b88c09dfdf69f04c8a85c91b4b201a6dc27eb6a4b8f642fc3ed2624801b544ab0227200000000000009a1bcab5adacb0ae7664cfaad72a71615890480b37db5312e4e0cbe82d6a58ff83dd4b2c7e783e87bc7f3df1b27b42c0e66"], 0x20}}, 0x0) 21:13:31 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 419.241730][T20668] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 21:13:31 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:31 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:31 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4}}], 0x1, 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000000)={0x8, 'batadv0\x00', {'team_slave_0\x00'}, 0x4}) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0)=0x2000000000000074, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000080)={@remote, 0x0}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@bridge_delneigh={0x58, 0x1d, 0x100, 0x70bd28, 0x25dfdbfc, {0x2, 0x0, 0x0, r2, 0x1, 0x0, 0x4}, [@NDA_DST_IPV4={0x8, 0x1, @empty}, @NDA_VLAN={0x6, 0x5, 0x2}, @NDA_PORT={0x6, 0x6, 0x4e21}, @NDA_PORT={0x6, 0x6, 0x4e24}, @NDA_DST_IPV6={0x14, 0x1, @empty}, @NDA_VLAN={0x6, 0x5, 0x3}]}, 0x58}, 0x1, 0x0, 0x0, 0x4080}, 0x20000000) syz_genetlink_get_family_id$netlbl_calipso(0x0) [ 419.777865][T20607] IPVS: ftp: loaded support on port[0] = 21 [ 419.859326][T20668] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 21:13:32 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 419.980889][T20617] IPVS: ftp: loaded support on port[0] = 21 21:13:37 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8903, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) pwrite64(r1, &(0x7f0000000000)="2aa6c4af63d8e1d08e7497b3bd6be90ae7ca48bea62e8007f38cef3cd9e9c171f16879822ec89d", 0x27, 0xd4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)={0x0, 0xbb0}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000080)='?', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r2, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r3, &(0x7f00000000c0)={0x30000012}) 21:13:37 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r3, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000040)={'wg1\x00', r7}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r9, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d50b441e692763513ef87456558", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=@bridge_getlink={0xb8, 0x12, 0x100, 0x70bd26, 0x25dfdbfd, {0x7, 0x0, 0x0, r3, 0x4040, 0x4}, [@IFLA_PHYS_PORT_ID={0x22, 0x22, "8c549bf29bcb52e8f96abf36ac5edf99327acf2537fd206ce236670b4fad"}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_XDP={0x1c, 0x2b, 0x0, 0x1, [@IFLA_XDP_FLAGS={0x8, 0x3, 0x8}, @IFLA_XDP_FD={0x8, 0x1, r9}, @IFLA_XDP_FD={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "5d0089bc187905c3a669cb"}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x3}, @IFLA_IFALIAS={0x14, 0x14, 'veth1_to_bond\x00'}, @IFLA_MAP={0x24, 0xe, {0x3, 0x0, 0x5, 0x0, 0x9, 0x1f}}]}, 0xb8}}, 0x0) 21:13:37 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x800}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4080, 0x41002}, [@IFLA_NET_NS_PID={0x8}, @IFLA_LINKMODE={0x5, 0x11, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x20040040}, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) 21:13:37 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8903, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 425.856844][T20822] IPVS: ftp: loaded support on port[0] = 21 [ 425.894091][ T26] kauditd_printk_skb: 19 callbacks suppressed [ 425.894103][ T26] audit: type=1804 audit(1589836417.927:515): pid=20827 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/167/memory.events" dev="sda1" ino=16371 res=1 [ 426.007208][T20833] IPVS: ftp: loaded support on port[0] = 21 [ 426.085736][T20922] IPVS: ftp: loaded support on port[0] = 21 21:13:38 executing program 3: r0 = socket(0x10, 0x802, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000580)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150005008178a8001600400001000200000094064434cf6efb8000a007a290457f0189b316277ce06bbace6617cbec4c2ee5a7cef4090000001fb791643a5ee4da1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf639cb9dbcdcc6b4c1f215ce3bb9ad809d5e1cace81ed0be0b42affcbee5de6ccd40dd6e4edef3d93452a92307f27260e970300000000", 0xd8}], 0x1, 0x0, 0xfffffe7d}, 0x44000) [ 426.213878][ T26] audit: type=1800 audit(1589836417.957:516): pid=20827 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16371 res=0 21:13:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000140)={0xffffffffffffffff}) write$cgroup_subtree(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="8383005a4eea00000000080060f89df03a8326bc28c16cd780526c8370d94ae41ae36b018dbba021b5a26fe0c62719785f5a7a3773b686ea71fc0404663ae080ca1804a27b73aa38855fdec750", @ANYRESDEC=r2], 0x3ff800) write$binfmt_elf32(r2, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [], "7724a468af042f5be536066d9fc29c46c85956843abe544dff1de342b47ade4008c705c88fba", [[], [], [], [], []]}, 0x55e) recvfrom(r2, &(0x7f0000000740)=""/144, 0x90, 0x2, 0x0, 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000040)={0x0, 0x100000000004, 0xb97f}) 21:13:38 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 426.339610][ T26] audit: type=1804 audit(1589836417.967:517): pid=20827 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/167/memory.events" dev="sda1" ino=16371 res=1 [ 426.485471][ T26] audit: type=1804 audit(1589836418.117:518): pid=20908 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/167/memory.events" dev="sda1" ino=16371 res=1 21:13:38 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000100)={0x0, 0x141e, 0x5, 0x59d, 0x7}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0x0, 0x0}, 0x10) [ 426.562672][T20875] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 426.641603][ T26] audit: type=1804 audit(1589836418.557:519): pid=20964 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/168/memory.events" dev="sda1" ino=16384 res=1 21:13:38 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:38 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d50b441e692763513ef87456558", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000580)={r0, r2}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468000000001800020014000100", @ANYBLOB], 0x48}}, 0x0) connect$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10) unshare(0x42000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x9, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x214}, 0x1, 0x0, 0x0, 0x24048051}, 0x4000) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmsg$NFQNL_MSG_VERDICT(r5, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)={0x5c, 0x1, 0x3, 0x101, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFQA_EXP={0x4}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x29f}, @NFQA_VLAN={0x14, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x3f}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}]}, @NFQA_MARK={0x8}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x4, 0x1}}, @NFQA_PAYLOAD={0x12, 0xa, "757ea869e39f732e54d8ebf3bc1f"}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40004}, 0x4040) syz_genetlink_get_family_id$SEG6(0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) [ 426.808553][ T26] audit: type=1800 audit(1589836418.567:520): pid=20964 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16384 res=0 [ 426.883783][T20875] IPVS: ftp: loaded support on port[0] = 21 [ 426.934510][ T26] audit: type=1804 audit(1589836418.577:521): pid=20964 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/168/memory.events" dev="sda1" ino=16384 res=1 [ 427.020964][T20833] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 427.107394][ T26] audit: type=1804 audit(1589836418.727:522): pid=20980 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/168/memory.events" dev="sda1" ino=16384 res=1 [ 427.223488][T20822] IPVS: ftp: loaded support on port[0] = 21 [ 427.241677][T20922] IPVS: ftp: loaded support on port[0] = 21 [ 427.242731][T20996] IPVS: ftp: loaded support on port[0] = 21 [ 427.337379][ T26] audit: type=1804 audit(1589836419.047:523): pid=20993 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/169/memory.events" dev="sda1" ino=16378 res=1 [ 427.498875][ T26] audit: type=1800 audit(1589836419.047:524): pid=20993 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16378 res=0 [ 428.190900][T21002] IPVS: ftp: loaded support on port[0] = 21 21:13:40 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8904, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:40 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000100)={0x0, 0x141e, 0x5, 0x59d, 0x7}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0x0, 0x0}, 0x10) 21:13:40 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:40 executing program 4: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r3, @ANYBLOB="19000000000000001c0012000c000100627269646765"], 0x3c}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000040)={'wg1\x00', r7}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x26}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r9, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d50b441e692763513ef87456558", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=@bridge_getlink={0xb8, 0x12, 0x100, 0x70bd26, 0x25dfdbfd, {0x7, 0x0, 0x0, r3, 0x4040, 0x4}, [@IFLA_PHYS_PORT_ID={0x22, 0x22, "8c549bf29bcb52e8f96abf36ac5edf99327acf2537fd206ce236670b4fad"}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_XDP={0x1c, 0x2b, 0x0, 0x1, [@IFLA_XDP_FLAGS={0x8, 0x3, 0x8}, @IFLA_XDP_FD={0x8, 0x1, r9}, @IFLA_XDP_FD={0x8}]}, @IFLA_PHYS_SWITCH_ID={0xf, 0x24, "5d0089bc187905c3a669cb"}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x3}, @IFLA_IFALIAS={0x14, 0x14, 'veth1_to_bond\x00'}, @IFLA_MAP={0x24, 0xe, {0x3, 0x0, 0x5, 0x0, 0x9, 0x1f}}]}, 0xb8}}, 0x0) 21:13:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) r2 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000040)) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000380), 0x101bf) socket$isdn(0x22, 0x3, 0x25) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001300)={0x2880008, r1, 0x0, 0x8}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) [ 428.583256][T21116] IPVS: ftp: loaded support on port[0] = 21 [ 428.656395][T21119] IPVS: ftp: loaded support on port[0] = 21 [ 429.498417][T21119] IPVS: ftp: loaded support on port[0] = 21 [ 429.589229][T21116] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 21:13:43 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8904, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:43 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000100)={0x0, 0x141e, 0x5, 0x59d, 0x7}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0x0, 0x0}, 0x10) 21:13:43 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:43 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0xf92a5000) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="ed6a1fbe4f759d195379073f5da66eed9d06b969c1e5eaabb399c307eceda8b0ebe9d5448631a249840e2eec384e15c3f679f31cfcd5e4e8aa6ab9769777b1bf3175e51338f34590f722c774a59868a4fd7bffd16cd3808ffe4053df4aaa5570e8dc66e801725c57311c1183b470d076aac5b3e891a818f1c82e081da552bf4e811849be44ee324f1fdef87573b39d3f9b892faaeb3ae4ff2c213066f29153ab240c0682e2f2bdc7b7bf3f981dc561820ac7f712aaf9d653500692287c050a78050e7a8cd3da600c53cb00"/216], 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r4, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) writev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000180)}, {&(0x7f0000000240)="5c8aae08aad2f771ad89190786df5a84d36e244413efbf1a999a7bbdbe170f51bccb2254542cf4a4bc0cc91f324c9e52970cf208bf7f6f411520ce8301e04f2f5317e0f330d849249e43f4c0ff8728fba38aa53434470964079e40a1402882730a517fab35de77ed7e", 0x69}, {&(0x7f00000002c0)="88705c8a3b7cdfb65cafa01a1c618bbf52ff1038284024661da457eff4218ab08bff105d905d8ddc3062767b59407432f9a4c1e2d5c0a93a57d23971a728e6fb13a1343f936b96c9dc45c2bcda0207038e2b6ca14af87fc7ca3a2a14d63d0e96", 0x60}, {0x0}, {&(0x7f0000000640)="e95d3f462d373df306deb38bb2a39b303569931cc2bffefdbab646cdc2fb435206f9ff5db2e702b786d1be3c2ee78218ad6a380b42fe2d42ab5932a5fcd8ed78d163e2677406c3810d3eaa3c41369b6fa75b0670ada4df278b70756ac83a5531d0b07556f106858bc5d96bf2d34a02543db33840cc0d6f41c7aa9869b173a3aea0ea0fe74c4ec3a6", 0x88}, {&(0x7f0000000380)="70384c336a7f", 0x6}], 0x6) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c000200080001000600000056f17a6c10b3df826bb929e778fe4ffa46e60c5bebdba39f2b50412531c18ecee0899e94a380a08592de0449c4e1defa0bceaf9322dbe5e9b4deb9"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r8 = socket(0x10, 0x2, 0x8) socket(0x1f, 0xa, 0x9) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKMODE={0x5, 0x11, 0x9}]}, 0x28}}, 0x0) 21:13:43 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8906, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 431.537658][T21212] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 431.572187][T21213] IPVS: ftp: loaded support on port[0] = 21 21:13:43 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000100)={0x0, 0x141e, 0x5, 0x59d, 0x7}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0x0, 0x0}, 0x10) [ 431.652446][T21215] 8021q: adding VLAN 0 to HW filter on device bond7 [ 431.665969][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 431.665982][ T26] audit: type=1804 audit(1589836423.697:531): pid=21253 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/171/memory.events" dev="sda1" ino=16370 res=1 [ 431.705270][ T26] audit: type=1804 audit(1589836423.717:532): pid=21220 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir516100174/syzkaller.xn1nMe/173/memory.events" dev="sda1" ino=16369 res=1 [ 431.750147][T21215] bond0: (slave bond7): Enslaving as an active interface with an up link [ 431.823962][T21212] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 431.832611][T21255] IPVS: ftp: loaded support on port[0] = 21 [ 431.843009][ T26] audit: type=1800 audit(1589836423.717:533): pid=21220 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16369 res=0 [ 431.926696][ T26] audit: type=1800 audit(1589836423.737:534): pid=21253 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16370 res=0 21:13:44 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:44 executing program 4: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) r2 = socket(0x10, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r3, &(0x7f0000000400)=[{&(0x7f0000000080)='?', 0x1}], 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001300"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000003fd9bb4c66fa5e4793e56ca5b6e6278b60fcdbd973b6359ee557f48c054a9bb88d2dddb4fc8b8139990524b1447692f55059308a8332ff4b18b8fc23e67e1f18458af2a7f10a4f8346b19fb925eebe49dfbfac0da4415071898d68d4a76a069a4936e25bc32a5ad9"], 0x20}}, 0x804) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000), &(0x7f00000000c0)=0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) sendto$inet(r1, &(0x7f00000012c0)="0c266b927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf93a1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 21:13:44 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000000100)={0x0, 0x141e, 0x5, 0x59d, 0x7}) 21:13:44 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x80010, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xfffffffffffffe57, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x24, 0x0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', @ifru_flags}) [ 432.145115][ T26] audit: type=1804 audit(1589836423.737:535): pid=21228 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/171/memory.events" dev="sda1" ino=16370 res=1 [ 432.260588][ T26] audit: type=1804 audit(1589836423.737:536): pid=21228 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/171/memory.events" dev="sda1" ino=16370 res=1 21:13:44 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 432.419602][T21329] IPVS: ftp: loaded support on port[0] = 21 [ 432.456801][ T26] audit: type=1804 audit(1589836423.867:537): pid=21228 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/171/memory.events" dev="sda1" ino=16370 res=1 [ 432.563139][ T26] audit: type=1804 audit(1589836423.877:538): pid=21257 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir516100174/syzkaller.xn1nMe/173/memory.events" dev="sda1" ino=16369 res=1 [ 432.677262][ T26] audit: type=1804 audit(1589836424.217:539): pid=21305 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/172/memory.events" dev="sda1" ino=16373 res=1 [ 432.767826][ T26] audit: type=1800 audit(1589836424.217:540): pid=21305 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16373 res=0 [ 432.813074][T21329] IPVS: ftp: loaded support on port[0] = 21 [ 432.914853][T21213] IPVS: ftp: loaded support on port[0] = 21 [ 432.926812][T21255] IPVS: ftp: loaded support on port[0] = 21 21:13:45 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8906, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) pipe(&(0x7f0000001d40)={0xffffffffffffffff}) bind$l2tp6(r3, &(0x7f0000001d80)={0xa, 0x0, 0x7ff, @mcast1, 0xff}, 0x20) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x269}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x0) 21:13:45 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, 0xffffffffffffffff, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:45 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:45 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8907, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 433.906579][T21436] IPVS: ftp: loaded support on port[0] = 21 [ 433.913487][T21433] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan2: link becomes ready 21:13:46 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 433.976623][T21440] IPVS: ftp: loaded support on port[0] = 21 [ 433.989026][T21442] IPv6: ADDRCONF(NETDEV_CHANGE): ipvlan3: link becomes ready 21:13:46 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$nl_route(0x10, 0x3, 0x0) bind$bt_hci(r0, &(0x7f00000019c0)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) 21:13:46 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:46 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f0000000240)={0x200, 0x1084, 0x400, 0x80, 0x2, 0x1f, 0xd, "536be4178a8a516b7b0753ee89741903d8bf69ef", "55ecef7d96c17920b7ec54ed33f9e16621c7e5b0"}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)=""/45, &(0x7f0000000200)=0x2d) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) recvmsg$can_bcm(r5, &(0x7f0000002e40)={&(0x7f00000008c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001980)=""/215, 0xd7}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/171, 0xab}, {&(0x7f0000002b40)=""/160, 0xa0}, {&(0x7f0000002c00)=""/156, 0x9c}], 0x5, &(0x7f0000002d40)=""/224, 0xe0}, 0x40002001) sendmsg$OSF_MSG_ADD(r6, &(0x7f0000003ac0)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000003a80)={&(0x7f0000002ec0)={0xbb8, 0x0, 0x5, 0x201, 0x0, 0x0, {0x2, 0x0, 0x4}, [{{0x254, 0x1, {{}, 0xfb, 0x6b, 0x8, 0x20, 0x4, 'syz0\x00', "323ff1c560d11ed6fc7636946e13f86d509421da23a3fdd2893d9a16e4d5f5f5", "3e05348cb0ee024d01c1a1faaa3156d6aba215abddf596ff74aba00ff67a97e8", [{0x8, 0x6b, {0x2, 0x3}}, {0x6, 0x3, {0x2}}, {0x7, 0xe0, {0x0, 0xd5d0}}, {0x7, 0x100, {0x7a23fb23283dd9e2, 0x1}}, {0x1, 0x7, {0x2, 0x9}}, {0x4427, 0x40, {0x0, 0xdd78}}, {0x2, 0x65cd}, {0x2, 0xe000, {0x3, 0xf0f}}, {0x3, 0x5, {0x2, 0x7f}}, {0xd1, 0x6}, {0x1, 0x0, {0x3, 0xd315}}, {0x2, 0x2, {0x1, 0x3}}, {0x7f, 0xffc4}, {0x8000, 0x200, {0x3, 0x5}}, {0xc34e, 0xfe, {0x0, 0x8000}}, {0x9b, 0x6, {0x3, 0x6}}, {0x8001, 0x0, {0x3, 0x5}}, {0x81, 0xba, {0x3, 0x17d}}, {0x6, 0x3f, {0x0, 0x3}}, {0xffff, 0xffff, {0x2, 0x6}}, {0x9, 0xaf9c, {0x1, 0xf130}}, {0x8000, 0x3, {0x3, 0x1}}, {0x7f, 0xb9, {0x0, 0x5}}, {0x8000, 0x7}, {0x8c, 0x6, {0x2, 0x80000000}}, {0xfffa, 0x3, {0x1}}, {0x20, 0x2, {0x2, 0x8}}, {0x82, 0x400, {0x2}}, {0x6, 0x240, {0x3, 0x31}}, {0x7, 0xffff, {0x0, 0x6b6c}}, {0xffff, 0x4, {0x1, 0x1}}, {0x4d, 0x3fb4, {0x1, 0xe63}}, {0x2, 0xff00, {0x0, 0x7}}, {0xf001, 0x2, {0x2, 0x4}}, {0x9, 0xfffc, {0x0, 0xb4}}, {0x1, 0x5, {0x3, 0xffffff00}}, {0x4, 0x8000, {0x3}}, {0x2, 0x0, {0x1, 0x2}}, {0x6, 0x6, {0x2, 0x8001}}, {0x7fc, 0x7ff, {0x0, 0x7fffffff}}]}}}, {{0x254, 0x1, {{0x0, 0x4}, 0x2, 0xff, 0x8001, 0x3ff, 0x1d, 'syz1\x00', "9ff1cfff14aa4b46c18c30e4591cd6be6bcc0d6489444476c17823960101c33a", "e2314945ab81f08f2c9a1b255fd51bae75dc8e5253d90cbe21b2961c230c986e", [{0x8, 0x57, {0x2, 0xffff83b2}}, {0x0, 0x7}, {0x8000, 0x8e6, {0x2, 0x5}}, {0x8, 0x6, {0x2, 0x3}}, {0x4fd7, 0x7f, {0x1, 0x2}}, {0x7, 0x6, {0x0, 0x6}}, {0xfff, 0x7, {0x0, 0x76}}, {0xee2, 0x5, {0x0, 0x26}}, {0xcca, 0x5, {0x1}}, {0x8000, 0x72, {0x3, 0x20}}, {0x8, 0x40, {0x3, 0x2}}, {0xe3b5, 0x18, {0x1, 0x3ff}}, {0x1f, 0x0, {0x0, 0x3f}}, {0x400, 0xfff, {0x1, 0x8}}, {0xf8, 0xdc, {0x2, 0x9633}}, {0x9, 0x800, {0x3, 0x290}}, {0x3f6, 0x9, {0x3, 0x20}}, {0xf199, 0x8, {0x3, 0x404}}, {0x3, 0x9b3, {0x3, 0x6}}, {0x2e, 0x8, {0x1}}, {0x6, 0x5, {0x2, 0x7}}, {0x3a, 0x1, {0x0, 0x2}}, {0xfff8, 0x3, {0x1, 0x5}}, {0x7, 0x8, {0x3, 0x28}}, {0xffff, 0x7, {0x0, 0x10000}}, {0x1000, 0x8000, {0x1, 0x7}}, {0x8, 0x100, {0x0, 0x4}}, {0x7, 0x0, {0x0, 0x5}}, {0x5, 0x7, {0x2, 0xf9}}, {0x2, 0x4, {0x2}}, {0x6, 0xff00, {0x0, 0x7}}, {0x8, 0x40, {0x53bf6d8f3df31628, 0x80000001}}, {0xc1, 0xf801, {0x2, 0x50}}, {0x6, 0x2cd9, {0x1, 0xfffffffc}}, {0x5, 0x100, {0x3, 0x1f52}}, {0x4, 0x3, {0x3}}, {0xff, 0x158b, {0x0, 0xfffffff8}}, {0x5, 0x7f, {0x3, 0x2be}}, {0x5, 0x0, {0x1, 0x400}}, {0x8, 0x20, {0x0, 0x9}}]}}}, {{0x254, 0x1, {{0x0, 0x5}, 0xff, 0x92, 0x3f, 0x5, 0x0, 'syz1\x00', "2494ffeec51341196dac73d44a7d2aac8a75a87e196edc3d85e4811d6a6fbe85", "1d5d5213346fbc724523cf76ff7043d66284e0e3e9a93883699160df50b02a65", [{0xfff8, 0x53, {0x3, 0x4}}, {0x9, 0x36, {0x2, 0x20}}, {0x4, 0x8001, {0x3, 0x6}}, {0x6, 0xf67, {0x1, 0xfbc57fd}}, {0x0, 0x2, {0x0, 0x8}}, {0xb0, 0x2182, {0x1, 0x5}}, {0x8, 0x2470, {0x1, 0x9}}, {0x3f, 0x619f, {0x0, 0x9}}, {0x3, 0x4, {0x0, 0x3}}, {0xfffd, 0x81, {0x0, 0x100}}, {0x4, 0x1, {0x2, 0x8}}, {0x0, 0x2, {0x2, 0x1}}, {0xff, 0x7, {0x0, 0xfffff4cb}}, {0x8, 0x7fff, {0x1, 0x4}}, {0x8, 0x3, {0x0, 0x3}}, {0x0, 0x6e, {0x0, 0xe3d1}}, {0xffff, 0x6, {0x2, 0x3ff}}, {0x7fff, 0x3, {0x2, 0x7}}, {0xe019, 0x390d, {0x2, 0x5}}, {0x0, 0x500, {0x2, 0x4}}, {0x4, 0x1000, {0x0, 0x5}}, {0x0, 0x6, {0x0, 0x188}}, {0xcc, 0x0, {0x0, 0x4f4}}, {0x7ff, 0x9, {0x1, 0x80000000}}, {0xf000, 0x7, {0x0, 0x1}}, {0x2, 0x9, {0x2, 0xffffffc0}}, {0x7, 0x1, {0x1, 0x2}}, {0x978, 0x8, {0x0, 0xffff43f5}}, {0x7, 0xe57, {0x2, 0x1e66}}, {0x4, 0x0, {0x0, 0x7}}, {0x7, 0x800, {0x1}}, {0xf25d, 0x6, {0x1, 0x7f}}, {0x8001, 0x7fff, {0x1, 0x1000}}, {0x42ea, 0x3, {0x3, 0x9}}, {0xf6, 0x4, {0x0, 0xfffffff9}}, {0xcd7, 0x8b1f, {0x3, 0x8}}, {0x2, 0x4ab7, {0x2}}, {0x7, 0x4, {0x2, 0x7}}, {0x5c34, 0x100, {0x3, 0xfff}}, {0x1000, 0x7, {0x1, 0x1c}}]}}}, {{0x254, 0x1, {{0x1, 0xce}, 0x1, 0x20, 0x1f, 0x8, 0x1c, 'syz0\x00', "d95695782dd086cff1d184168b38722a087f89e08317b5043c446df0a6d21bf6", "bfb3728733c486fd93d3141b0a075c06e153e798373e9c51562bc68e40fc5c36", [{0x945, 0x4, {0x0, 0x1}}, {0x6, 0x7, {0x1, 0x928}}, {0x4, 0x6, {0x1, 0x6}}, {0x7, 0x5, {0x0, 0x8001}}, {0x4, 0x252, {0x2, 0x100}}, {0x7fff, 0x101, {0x2, 0x97}}, {0xca, 0x8, {0x2, 0x80000000}}, {0x9, 0x5, {0x1, 0x2}}, {0x1, 0x0, {0x3, 0x80000000}}, {0x5, 0x1f, {0x1, 0x4}}, {0x8000, 0x6, {0x1, 0x8}}, {0x2507, 0x8, {0x0, 0xc06}}, {0x9, 0xcf, {0x2, 0x7fff}}, {0x3ff, 0x100, {0x2, 0x400}}, {0x100, 0x1, {0x2, 0x7}}, {0x2, 0xfff, {0x2, 0x3}}, {0xb0, 0x2, {0x3, 0x76550b37}}, {0x81, 0x5, {0x1, 0x1}}, {0x9, 0xff, {0x0, 0x2}}, {0x401, 0x75a4, {0x1, 0x2}}, {0xaa1, 0x0, {0x2, 0x20}}, {0x3ff, 0xba, {0x2, 0x1}}, {0xf1e, 0xfc01, {0x3, 0x3ff}}, {0x9, 0x3ff, {0x1, 0x81}}, {0x9, 0x7, {0x3, 0x3}}, {0x0, 0x1, {0x0, 0x133}}, {0x562b, 0x5, {0x0, 0xffff}}, {0x1, 0x1f, {0x1, 0xddac}}, {0xff, 0x8001, {0x1, 0x80}}, {0x6, 0x7, {0x3, 0x8}}, {0xfff, 0x800}, {0x342, 0x1ff, {0x2, 0xfffffff7}}, {0x1, 0x8001, {0x0, 0xa00000}}, {0x3, 0x3f, {0x2, 0x100}}, {0x58, 0x8001, {0x2, 0x200}}, {0x5, 0x0, {0x0, 0x101}}, {0xc, 0x6, {0x1, 0x7f}}, {0x400, 0xff, {0x3, 0xc5}}, {0x7, 0xfff, {0x1, 0x19}}, {0x75f, 0x6, {0x1, 0x6}}]}}}, {{0x254, 0x1, {{0x2, 0x9}, 0x7, 0x6, 0x400, 0x7fff, 0x7, 'syz1\x00', "07de6d3abcb95d84f9375ba084b2d0a8ac5c6777595b94c607a441e304cb09ad", "473f7852238e8ec35d89ce58933e14c6cf44539fedfa78bd4aff4ecc03a69976", [{0x3, 0x5, {0x1, 0x4}}, {0x1004, 0x400, {0x1, 0x2}}, {0x4, 0x8, {0x2, 0x7a32}}, {0xc3, 0x8, {0x2, 0x20}}, {0xbb69, 0x6c89, {0x0, 0xfffffff7}}, {0xad, 0x5, {0x2, 0x401}}, {0x8, 0xbb2, {0x2, 0xfffffbff}}, {0x2, 0x4, {0x2, 0x8}}, {0xfffd, 0x3, {0x0, 0x8}}, {0x9728, 0x0, {0x1, 0x7fffffff}}, {0x8, 0x6, {0x3, 0x3}}, {0x3ff, 0x5, {0x2, 0xfff}}, {0xd404, 0x5, {0x3, 0x2}}, {0x81, 0x800, {0x0, 0x8}}, {0x51, 0xe0, {0x3, 0x36}}, {0xffff, 0x5, {0x1, 0x603c}}, {0x3ff, 0xeb8, {0x2, 0x3ff}}, {0x76e, 0x0, {0x1, 0x3}}, {0xaa8b, 0x400, {0x3, 0x1ff}}, {0xe5, 0x2, {0x2, 0x7}}, {0x2, 0xe72, {0x2, 0x7}}, {0x5, 0x2, {0x3}}, {0x8d7, 0x0, {0x2, 0x7fff}}, {0x0, 0x3, {0x0, 0xfffffff8}}, {0x0, 0x0, {0x2, 0x1}}, {0x5622, 0x2, {0x3, 0x100}}, {0x2, 0x8001, {0x2, 0x9}}, {0x22c, 0x7ff, {0x0, 0x6ab0}}, {0x31f2, 0x6, {0x0, 0x1}}, {0x9, 0x101, {0x0, 0x200}}, {0xb5, 0x80, {0x0, 0x7}}, {0x94, 0x2, {0x3, 0xfffffff8}}, {0x46f2, 0x1, {0x2, 0x9}}, {0x3, 0xd1a8, {0x0, 0x10000}}, {0x2, 0x3, {0x0, 0x7}}, {0x2, 0x507b, {0x3, 0x6}}, {0x0, 0xd958, {0x2, 0x1}}, {0x8, 0x1000, {0x3, 0x10001}}, {0x3, 0x3, {0x2, 0x40}}, {0x7, 0x40, {0x1, 0x89}}]}}}]}, 0xbb8}, 0x1, 0x0, 0x0, 0x20002000}, 0x10) sendfile(r2, r4, 0x0, 0x98c9) mmap(&(0x7f0000334000/0x1000)=nil, 0x1000, 0x2, 0x28010, r0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r8, r7, 0x0, 0x100000010) [ 434.886805][T21436] IPVS: ftp: loaded support on port[0] = 21 [ 434.933192][T21440] IPVS: ftp: loaded support on port[0] = 21 21:13:49 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8907, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:49 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:49 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:49 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8907, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x22, 0x1, 0x400) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="3000000013000100"/20, @ANYRES32=0x0, @ANYBLOB="001ecde889000000080013000f6c6c1b96e8921e7f4133be62f3e32642cd4e943db3b463207f991d3635dd67b275dc8d841a1f8c266f20000000320500000056b12e277366af5aaa03d04d89c60418ce599af02ed952130f8c54a57d20256ed164bbbd74afa27ab9e6076b2742c44fa4f8dac1ebecd8b013afe573c872543a1dfa53f9bcefc31f5ec04e5e0d9cb503b43465d280a65b6e39312126a54b82b7888b7610fb8c52a63f82e7fb4e408e15ebd54d96385a4069e1b95892e66df4cd408f274cc6fb8f5490bef8885bf421908f52e91ff5d76cb6bb08e44f82a63cb7991ba444c9d085eca9b1a3708e19335b57", @ANYRES32=0x0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x30}}, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0xe, 0x0, "26f893b6450da3893a6208c6a84459886eb8732c148bcf7299c043bc66254508a5b39651e5d34595b617162023175fb3b810e8d578a47c82782442d6d8bdec9c2b11a758f00000000800000f9d00"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x3c, @local, 0x4e20, 0x3, 'lblc\x00', 0x26, 0x7ff, 0x3f}, 0x2c) sendto$inet6(r1, &(0x7f00000003c0)="843ba1539c731b3b0dd2344495cb051e98d6ad27a7b3d327a48d6d5319c41c9111b0973e09cb809ad8c458c6a14c6e8c5f177a5322a66ae4a4d15a764ba42c101587608c37aa8571767a0ad363774a812280d4117e62c1c2265a42da82d9de5794d789de6d3c", 0x66, 0x200400d4, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000000)=0x300, 0x4) 21:13:49 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x890b, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:49 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000001ec0)={0x1, 0x3}, 0x8) r1 = socket(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000001f80)) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) recvmmsg(r1, &(0x7f0000001dc0)=[{{&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000100)=""/136, 0x88}, {&(0x7f00000001c0)=""/147, 0x93}, {&(0x7f0000000280)=""/200, 0xc8}, {&(0x7f0000000380)=""/228, 0xe4}, {&(0x7f0000000480)=""/133, 0x85}, {&(0x7f0000000540)=""/110, 0x6e}, {&(0x7f00000005c0)=""/44, 0x2c}, {&(0x7f0000000600)=""/69, 0x45}], 0x8, &(0x7f0000000700)=""/246, 0xf6}, 0x1f}, {{&(0x7f0000000800), 0x80, &(0x7f0000001940)=[{&(0x7f0000000880)=""/141, 0x8d}, {&(0x7f0000000940)=""/4096, 0x1000}], 0x2}}, {{&(0x7f0000001980)=@isdn, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001a00)=""/173, 0xad}, {&(0x7f0000001ac0)=""/178, 0xb2}, {&(0x7f0000001b80)=""/232, 0xe8}, {&(0x7f0000001c80)=""/113, 0x71}], 0x4, &(0x7f0000001d40)=""/90, 0x5a}, 0x74}], 0x3, 0x10000, &(0x7f0000001e80)={0x0, 0x3938700}) listen(r3, 0x3) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001f40)=ANY=[@ANYBLOB="2c0000001400b59500000000000000000a000000", @ANYRES32=r7, @ANYBLOB="1400020200000000ffff00000000c7596c8b32bb82ded8b44902677d0b419f2151d785cf"], 0x2c}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000001f00)={@remote, 0x28, r7}) r8 = accept4$rose(r6, 0x0, &(0x7f0000003640), 0x800) sendmsg$unix(0xffffffffffffffff, &(0x7f00000036c0)={&(0x7f0000001fc0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000035c0)=[{&(0x7f0000002040)="d755aab88b441ee988a62cfe7d1f1bcc8fdfe9adac62a21f4bda0549ed4062882be76062b78cbbaa6feb4dd07da1b7b0b6e38993cb6fdf1c3ddd3fd1512675d9dbbd6a907f986fd4a87c1c4997c52dc49fd9987bf460f902f03d3f4b09fcf5f379b3ed77168d59eecc41274ba9681b90ab1e1a742d7610ad791d1bf21ebd363901665ef231fcfeb1a47a0cbc750f02a07fcb2da3e3096ef9efbb9fc01fa5309088384a330e2345f6fb6117d8ac8518c260f97e0eac00c1b329f75b060c9a47481d5454eacffe11ac003a02d446d5f30a529c7726fd60dc60b7917f824912fed8cb9f6ce674d383190e86f32e471a5fec85ea420f3a8855", 0xf7}, {&(0x7f0000002140)="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", 0xfa}, {&(0x7f0000002240)="4487e8540b9f471cf025a7f603ba49bea67f0d1eb9", 0x15}, {&(0x7f0000002280)="2006dd60e20c55ae3e563f753a8db48c8ca85dc56b53b158b109b23112cb4eddd471cd99c031238672a2c7ddeec6dd30e69573ee7f379f717d81c7edca681fb7dbcfb96c62b5005e696451e5644a500cf56e6a3c1d32109c0dd12872b7643684cde858507483a5720e", 0x69}, {&(0x7f0000002300)="1f409c4a67600f6514362ec821efb371b324f12a7aef02e198760a961dce20c3f84394638652bf0fc3ecf04e9ac1eb6cd1c9e111a905e72ad9ef4a6cf8a2cbaddb9ce6b97ae4bf28b7c154dca3a1d438e619a9f466366331f49f2a9547d5b8bbf2783d038e38fcfa83642fc4717af54e39a95749bfbfb5a533011df1351befd68f554616230d2fa1ac2e18af11a59ec10090b80a7deaa3b6a2047cfde79dda142b5334c386745bc830e11e02af795914bb0f80bedf291f83c3cb3012104289347b25ca26a873deb30d93b53c95f895f5250925c9b5d1d78228078cca13787c41a83a84", 0xe3}, {&(0x7f0000003700)="f2bfa47247f9b91e4666b1c58e70c5adba14d3cad8c0130473c4d591e5ced6ee8c240836faf54beda1e1fd7b6e0b4e95848c72dd5c40b2c32d301fdff64771ec19994dbd3c8f6e365c7d930d61ad230ae4ae0177701a4a0efb30878907ea804ccd082d2db343e192d3cbe89dd860687d41699bd573594244d758725fddb56db3036a5d6e7f1b75397dd5da7c23d2580d7c507bfe56759394b4f90186b483996ea545f79d09817d97ec8fc7555777e8d4ae639c9a05775cfee24f50654bd0533ab1cbcf8ad33499b0", 0xc8}, {&(0x7f0000002500)="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", 0x1000}, {&(0x7f0000003500)="434b16ac95b07f2047e26445e117a0a482bac780460e509eb2bd6fbed0b01053f6da35c97efa3ac823a08234d0180f0fc8ccc5a294b5d2369f8808509e30f72685904b08f5fe59cbd93700fc894a1729a408eac36e0567f56fbc64eda582c19019538eb2c9920d76513975213aa21437c25b5f371193c48406656d636c51dba2d5b96611bbd5bc2d884fd14d349997394b0d00d4ebe39998c59ce7d3a1d3e74cc4fed584", 0xa4}], 0x8, &(0x7f0000003680)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r8]}}], 0x20, 0x24000001}, 0x4040000) close(r0) [ 437.830002][ T26] kauditd_printk_skb: 14 callbacks suppressed [ 437.830015][ T26] audit: type=1804 audit(1589836429.867:555): pid=21587 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/175/memory.events" dev="sda1" ino=16367 res=1 [ 437.859028][T21590] IPVS: ftp: loaded support on port[0] = 21 [ 437.896948][T21586] IPVS: ftp: loaded support on port[0] = 21 [ 437.912958][T21589] IPVS: ftp: loaded support on port[0] = 21 21:13:50 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 438.035365][ T26] audit: type=1800 audit(1589836429.867:556): pid=21587 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16367 res=0 [ 438.130105][ T26] audit: type=1804 audit(1589836429.907:557): pid=21587 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/175/memory.events" dev="sda1" ino=16367 res=1 21:13:50 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 438.301770][ T26] audit: type=1804 audit(1589836430.037:558): pid=21587 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/175/memory.events" dev="sda1" ino=16367 res=1 21:13:50 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r5, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0x10, 0x803, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x18}, [@ldst={0x4, 0x0, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xbe, &(0x7f000000cf3d)=""/190, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 438.461101][ T26] audit: type=1804 audit(1589836430.437:559): pid=21660 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/176/memory.events" dev="sda1" ino=16375 res=1 [ 438.598201][ T26] audit: type=1800 audit(1589836430.437:560): pid=21660 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16375 res=0 21:13:50 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r4, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 438.744397][ T26] audit: type=1804 audit(1589836430.457:561): pid=21660 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/176/memory.events" dev="sda1" ino=16375 res=1 [ 438.831049][ T26] audit: type=1804 audit(1589836430.587:562): pid=21671 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/176/memory.events" dev="sda1" ino=16375 res=1 [ 438.975844][T21586] IPVS: ftp: loaded support on port[0] = 21 [ 439.024311][T21589] IPVS: ftp: loaded support on port[0] = 21 21:13:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000037000505d25a80648c63940d0424fc60100000000a000000053582c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00', 0x0, [0x0, 0xd803]}, &(0x7f0000000080)=0x54) 21:13:51 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:51 executing program 4: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in6={0xa, 0x2, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000], [], @remote}}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x48}, 0x0) r1 = socket(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002a40)=[{{&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000000280)=""/142, 0x8e}, {&(0x7f0000000340)=""/107, 0x6b}, {&(0x7f00000005c0)=""/200, 0xc8}, {&(0x7f00000003c0)=""/63, 0x3f}, {&(0x7f00000006c0)=""/83, 0x53}], 0x7, &(0x7f00000007c0)=""/79, 0x4f}, 0xae5}, {{&(0x7f0000000840)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000002980)=""/142, 0x8e}], 0x1, &(0x7f0000000900)=""/34, 0x22}, 0x3}], 0x2, 0x100, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010000000000000000001b0000000104000000000000"], 0x1c}}, 0x0) socket(0x10, 0x803, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x4, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @private=0xa010100}}]}, 0x2c}}, 0x20004004) sendmsg$NL80211_CMD_GET_INTERFACE(r2, &(0x7f0000002b80)={&(0x7f0000002ac0), 0xc, &(0x7f0000002b40)={&(0x7f0000002b00)={0x24, r4, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=ANY=[@ANYBLOB="300000000000c3fb00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001300", @ANYRES32=0x0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x30}}, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x2001, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000001c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000002bc0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000003340)={&(0x7f0000002c00)={0x734, r4, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_IE_PROBE_RESP={0x3e1, 0x7f, "d1620d754db4c984d635a7062189113db4159312510d49d5631afbae8d60584b239624f2d89f3235eeaeacc724fa277419ea953f9cb1daccace1e102cf9dadf5bbd841990dc4c4654cec0a8a5d6da0e8c718d38aadc91da4fe42243d426e0c523cb2352a8f63b8a94ee52a2beb8e353f18e0dc2ab26ecde4cfc559bf53c502d96a59bba097080ce7e486e489400f9323822e99bef2b8811c2a035cca2a785c770ee4da083547353a211c4816580de9de7e876fb738901732817d63404096a401db2f35d1b22c6f616a5c13d4d7494cc3dea1df17fbb50068691876dd1fb427f39c9bd5ecbeae240078bed08fa5a17bb60f5bf437932fb34d7ebb91c0c2003a1e99e0090396215401626775ef86046e06268f5f8bdb1cc6415338a193466061b5434d9c71542950e71dab9f3a377493a031b3d9605fa39652d333c7463379eb33cec9cdb25ea74b6716d96a68361f392d5e7e2393dd51b245422dd12423cc744299e3b15fc9b82e4bc8fa248731635378d8a80647311460d70fd3afbaa9bf9a97e84979b6bf58de4e161e084ddb7cfd39a04e587bc780689c3c8bc09926dbf6d01b1ee4451459e0a3b4b546b467b37bfb2f0860b1608ac54a4653cfa2ebae7de63cab5ad043c4c1faf007de0028696b26995073ff53a8855fc849d5d82d5c0c1a43f4e4ef13ab79de7488711d81f532fc5bf34151770f002655b0d87762daccac0d0b0ff366745a3f88134c4d1e4595aaff188e869df6c989ca08165129307fde534f0af55ca87d16005892f306e946c7180a61097146c2a8bbe0a3dcc35a043b8ccddc0f4e65cf7ca5373d45d57a534cc16f3ee9f38a89d862b587067b5eba0b8f6bf37147a7d5897ae933f2ad350a29582df6036d128e9265c4a9b2e789af770ffc9bdee764494f85bb9ad3b5d133b4827d89166899258b30f721d7eb8871b911e1e765408ce6b48847161d06c7c4bee9efa9910e31fddfe5d9f289227305b8ad6432ef141934142f707fbb3120ed96c718d50d3e11a990bf4ac631c52a43d67f55f10b075f8f6ae6acd316e7c17f8e48dcb2d7a894c8a3e1d0529b95dd6c40e036fb7799ac4921439ec630854bb84a347cc348837ea6dcbceb538ce4c34770da35e940b20c5734e5dedcee9b76f35d7f326706ab5c11e62f7735b2a72edde262eef620b896473a668b6f487d3e1114968105703f01b24e3836f8ff451099ec2ccb73d40b488cec3fd8a40e0aea65e19beff6ce8d0ee928c21b7c79520eeb4e76f59f4b2cbdfaac3d05ffe0267b2ae02ae85dfa827db71c834d01ce4da105027d4f30e7bdb4013b659a6057f724b5d0373575c5b7f3d128e2596b39ea7b0a5da19a4f724a3d7dc6d90a6023ed76ecde61b4ac640375f043e7de2b287b"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x5}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x3}, @NL80211_ATTR_PRIVACY={0x3}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}, @NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_BEACON_TAIL={0x319, 0xf, "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"}]}, 0x734}, 0x1, 0x0, 0x0, 0x884}, 0x28000084) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'ipvlan0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}}) [ 439.479902][T21738] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 439.490063][ T26] audit: type=1804 audit(1589836431.537:563): pid=21737 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/177/memory.events" dev="sda1" ino=16371 res=1 [ 439.491556][T21739] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 439.577696][T21741] IPVS: ftp: loaded support on port[0] = 21 [ 439.615256][ T26] audit: type=1800 audit(1589836431.537:564): pid=21737 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16371 res=0 21:13:52 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x890b, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:52 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r4, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:52 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:52 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000100)) write$cgroup_subtree(r1, &(0x7f0000000040), 0x45) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000240)={0x0, 0x2000ffff, 0x0, 0x0, 0x2, [{}, {}]}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) getpeername$inet(r2, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) 21:13:52 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x890c, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 440.414854][T21739] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 440.452094][T21801] IPVS: ftp: loaded support on port[0] = 21 21:13:52 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) sendmsg$can_j1939(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r4, 0x0, {0x2, 0x1, 0x2}, 0x2}, 0x18, &(0x7f0000000240)={&(0x7f0000000200)="12dec2", 0x3}, 0x1, 0x0, 0x0, 0x40005}, 0x94c572fca130e38b) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:52 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8907, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 440.527195][T21806] IPVS: ftp: loaded support on port[0] = 21 21:13:52 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:52 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 440.840726][T21833] IPVS: ftp: loaded support on port[0] = 21 21:13:52 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:53 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r4}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:53 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 441.698161][T21801] IPVS: ftp: loaded support on port[0] = 21 [ 441.797951][T21806] IPVS: ftp: loaded support on port[0] = 21 [ 442.519123][ T196] tipc: TX() has been purged, node left! 21:13:54 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x890c, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:54 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:54 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:54 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 442.659003][ T196] tipc: TX() has been purged, node left! [ 442.764581][ T196] tipc: TX() has been purged, node left! [ 442.864216][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 442.864240][ T26] audit: type=1804 audit(1589836434.897:582): pid=21953 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/180/memory.events" dev="sda1" ino=16378 res=1 [ 442.941413][T21963] IPVS: ftp: loaded support on port[0] = 21 [ 442.953683][ T196] tipc: TX() has been purged, node left! [ 443.019656][ T196] tipc: TX() has been purged, node left! [ 443.029699][ T196] tipc: TX() has been purged, node left! [ 443.058405][ T196] tipc: TX() has been purged, node left! [ 443.094778][ T196] tipc: TX() has been purged, node left! [ 443.239295][ T196] tipc: TX() has been purged, node left! [ 443.321889][T21963] IPVS: ftp: loaded support on port[0] = 21 [ 443.359380][ T196] tipc: TX() has been purged, node left! [ 443.365937][ T196] tipc: TX() has been purged, node left! [ 443.386343][ T196] tipc: TX() has been purged, node left! [ 443.402318][ T196] tipc: TX() has been purged, node left! [ 443.416927][ T196] tipc: TX() has been purged, node left! [ 443.429862][ T196] tipc: TX() has been purged, node left! [ 443.559112][ T196] tipc: TX() has been purged, node left! [ 443.718924][ T196] tipc: TX() has been purged, node left! [ 443.879148][ T196] tipc: TX() has been purged, node left! [ 443.885329][ T196] tipc: TX() has been purged, node left! [ 443.892497][ T196] tipc: TX() has been purged, node left! [ 443.898304][ T196] tipc: TX() has been purged, node left! [ 444.108874][ T196] tipc: TX() has been purged, node left! [ 444.298837][ T196] tipc: TX() has been purged, node left! [ 444.548847][ T196] tipc: TX() has been purged, node left! [ 444.718854][ T196] tipc: TX() has been purged, node left! [ 444.839177][ T196] tipc: TX() has been purged, node left! 21:13:57 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x890d, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket(0x10, 0x803, 0x6) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@getchain={0x2c, 0x66, 0x800, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0xfff2, 0xc}, {0xe, 0x10}, {0xfff1, 0xa}}, [{0x8, 0xb, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x20040084) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x88}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:13:57 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:57 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:57 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:57 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x890d, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 445.018860][ T196] tipc: TX() has been purged, node left! [ 445.077183][ T26] audit: type=1804 audit(1589836437.107:583): pid=22033 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/181/memory.events" dev="sda1" ino=16035 res=1 [ 445.128968][T22032] IPVS: ftp: loaded support on port[0] = 21 [ 445.143082][T22038] IPVS: ftp: loaded support on port[0] = 21 21:13:57 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 445.187286][ T26] audit: type=1800 audit(1589836437.107:584): pid=22033 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16035 res=0 [ 445.207459][ T196] tipc: TX() has been purged, node left! [ 445.219602][ T196] tipc: TX() has been purged, node left! 21:13:57 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:57 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 445.281042][ T196] tipc: TX() has been purged, node left! [ 445.329246][ T196] tipc: TX() has been purged, node left! [ 445.370981][ T26] audit: type=1804 audit(1589836437.107:585): pid=22033 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/181/memory.events" dev="sda1" ino=16035 res=1 21:13:57 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 445.458633][ T196] tipc: TX() has been purged, node left! [ 445.490243][ T196] tipc: TX() has been purged, node left! [ 445.496611][ T196] tipc: TX() has been purged, node left! 21:13:57 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:57 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 445.572588][ T196] tipc: TX() has been purged, node left! [ 445.595438][ T26] audit: type=1804 audit(1589836437.257:586): pid=22033 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/181/memory.events" dev="sda1" ino=16035 res=1 [ 445.725145][ T26] audit: type=1804 audit(1589836437.607:587): pid=22089 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/182/memory.events" dev="sda1" ino=16035 res=1 [ 445.760074][ T196] tipc: TX() has been purged, node left! [ 445.876148][ T26] audit: type=1800 audit(1589836437.607:588): pid=22089 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16035 res=0 [ 445.918926][ T196] tipc: TX() has been purged, node left! [ 445.936869][ T26] audit: type=1804 audit(1589836437.607:589): pid=22089 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/182/memory.events" dev="sda1" ino=16035 res=1 [ 445.970964][ T26] audit: type=1804 audit(1589836437.797:590): pid=22096 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/182/memory.events" dev="sda1" ino=16035 res=1 [ 446.095281][T22032] IPVS: ftp: loaded support on port[0] = 21 [ 446.109084][ T196] tipc: TX() has been purged, node left! [ 446.129628][ T196] tipc: TX() has been purged, node left! [ 446.150987][T22038] IPVS: ftp: loaded support on port[0] = 21 [ 446.177189][ T196] tipc: TX() has been purged, node left! [ 446.211122][ T196] tipc: TX() has been purged, node left! [ 446.267875][ T196] tipc: TX() has been purged, node left! [ 446.279144][ T196] tipc: TX() has been purged, node left! [ 446.300567][ T196] tipc: TX() has been purged, node left! [ 446.336960][ T196] tipc: TX() has been purged, node left! [ 446.509084][ T196] tipc: TX() has been purged, node left! [ 446.689057][ T196] tipc: TX() has been purged, node left! 21:13:58 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8912, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:13:58 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:58 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:58 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:58 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, 0x0, 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:58 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8912, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 446.840183][ T196] tipc: TX() has been purged, node left! [ 446.889159][ T26] audit: type=1804 audit(1589836438.927:591): pid=22171 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/183/memory.events" dev="sda1" ino=16178 res=1 [ 446.946984][T22174] IPVS: ftp: loaded support on port[0] = 21 [ 446.964624][T22175] IPVS: ftp: loaded support on port[0] = 21 [ 446.979860][ T196] tipc: TX() has been purged, node left! [ 447.021412][ T196] tipc: TX() has been purged, node left! [ 447.058421][ T196] tipc: TX() has been purged, node left! 21:13:59 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:59 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r6}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 447.102389][ T196] tipc: TX() has been purged, node left! 21:13:59 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, 0x0, 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:13:59 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 447.162897][ T196] tipc: TX() has been purged, node left! [ 447.213344][ T196] tipc: TX() has been purged, node left! [ 447.220812][ T196] tipc: TX() has been purged, node left! [ 447.259772][ T196] tipc: TX() has been purged, node left! 21:13:59 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:13:59 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 447.420437][ T196] tipc: TX() has been purged, node left! [ 447.598835][ T196] tipc: TX() has been purged, node left! [ 447.738840][ T196] tipc: TX() has been purged, node left! [ 447.768836][T22174] IPVS: ftp: loaded support on port[0] = 21 [ 447.807662][T22175] IPVS: ftp: loaded support on port[0] = 21 [ 447.850826][ T196] tipc: TX() has been purged, node left! [ 447.856867][ T196] tipc: TX() has been purged, node left! [ 447.904258][ T196] tipc: TX() has been purged, node left! [ 447.925784][ T196] tipc: TX() has been purged, node left! [ 447.956862][ T196] tipc: TX() has been purged, node left! [ 448.018015][ T196] tipc: TX() has been purged, node left! [ 448.025955][ T196] tipc: TX() has been purged, node left! [ 448.208872][ T196] tipc: TX() has been purged, node left! 21:14:00 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:00 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:00 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, 0x0, 0x100000001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:00 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:00 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 448.369028][ T196] tipc: TX() has been purged, node left! [ 448.438102][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 448.438116][ T26] audit: type=1804 audit(1589836440.467:599): pid=22303 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/185/memory.events" dev="sda1" ino=16378 res=1 [ 448.534605][T22307] IPVS: ftp: loaded support on port[0] = 21 [ 448.556483][ T26] audit: type=1800 audit(1589836440.467:600): pid=22303 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16378 res=0 [ 448.600119][ T196] tipc: TX() has been purged, node left! [ 448.619899][ T196] tipc: TX() has been purged, node left! [ 448.627217][ T196] tipc: TX() has been purged, node left! [ 448.652380][ T196] tipc: TX() has been purged, node left! [ 448.678034][ T26] audit: type=1804 audit(1589836440.467:601): pid=22303 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/185/memory.events" dev="sda1" ino=16378 res=1 [ 448.706231][ T196] tipc: TX() has been purged, node left! [ 448.733193][ T196] tipc: TX() has been purged, node left! [ 448.757259][ T196] tipc: TX() has been purged, node left! [ 448.797759][ T26] audit: type=1804 audit(1589836440.617:602): pid=22303 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/185/memory.events" dev="sda1" ino=16378 res=1 [ 448.959006][ T196] tipc: TX() has been purged, node left! [ 449.073865][T22307] IPVS: ftp: loaded support on port[0] = 21 [ 449.116008][ T196] tipc: TX() has been purged, node left! [ 449.170749][ T196] tipc: TX() has been purged, node left! [ 449.197693][ T196] tipc: TX() has been purged, node left! [ 449.438882][ T196] tipc: TX() has been purged, node left! [ 449.482341][ T196] tipc: TX() has been purged, node left! [ 449.548848][ T196] tipc: TX() has been purged, node left! [ 449.708788][ T196] tipc: TX() has been purged, node left! [ 449.858841][ T196] tipc: TX() has been purged, node left! [ 450.029318][ T196] tipc: TX() has been purged, node left! [ 450.188810][ T196] tipc: TX() has been purged, node left! [ 450.360372][ T196] tipc: TX() has been purged, node left! [ 450.558818][ T196] tipc: TX() has been purged, node left! [ 450.718846][ T196] tipc: TX() has been purged, node left! [ 450.898838][ T196] tipc: TX() has been purged, node left! 21:14:03 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:03 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:03 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:03 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:03 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8915, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 451.068283][ T196] tipc: TX() has been purged, node left! [ 451.123998][T22381] IPVS: ftp: loaded support on port[0] = 21 21:14:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 451.182531][ T26] audit: type=1804 audit(1589836443.217:603): pid=22386 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/186/memory.events" dev="sda1" ino=16370 res=1 [ 451.193475][T22389] IPVS: ftp: loaded support on port[0] = 21 21:14:03 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:03 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 451.261153][ T196] tipc: TX() has been purged, node left! [ 451.299618][ T196] tipc: TX() has been purged, node left! [ 451.329772][ T26] audit: type=1800 audit(1589836443.247:604): pid=22386 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16370 res=0 [ 451.366990][ T196] tipc: TX() has been purged, node left! [ 451.394989][ T196] tipc: TX() has been purged, node left! [ 451.422642][ T26] audit: type=1804 audit(1589836443.257:605): pid=22386 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/186/memory.events" dev="sda1" ino=16370 res=1 [ 451.460309][ T196] tipc: TX() has been purged, node left! [ 451.486551][ T196] tipc: TX() has been purged, node left! 21:14:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:03 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:03 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 451.593143][ T196] tipc: TX() has been purged, node left! [ 451.641987][ T26] audit: type=1804 audit(1589836443.397:606): pid=22402 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/186/memory.events" dev="sda1" ino=16370 res=1 [ 451.779605][ T196] tipc: TX() has been purged, node left! [ 451.786530][ T26] audit: type=1804 audit(1589836443.817:607): pid=22448 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/187/memory.events" dev="sda1" ino=16380 res=1 [ 451.909812][ T26] audit: type=1800 audit(1589836443.817:608): pid=22448 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16380 res=0 [ 451.989188][ T196] tipc: TX() has been purged, node left! [ 452.066075][T22381] IPVS: ftp: loaded support on port[0] = 21 [ 452.130326][T22389] IPVS: ftp: loaded support on port[0] = 21 [ 452.154041][ T196] tipc: TX() has been purged, node left! [ 452.165530][ T196] tipc: TX() has been purged, node left! [ 452.197228][ T196] tipc: TX() has been purged, node left! [ 452.229661][ T196] tipc: TX() has been purged, node left! [ 452.266618][ T196] tipc: TX() has been purged, node left! [ 452.292654][ T196] tipc: TX() has been purged, node left! [ 452.299885][ T196] tipc: TX() has been purged, node left! [ 452.307740][ T196] tipc: TX() has been purged, node left! [ 452.478803][ T196] tipc: TX() has been purged, node left! [ 452.685315][ T196] tipc: TX() has been purged, node left! [ 452.848826][ T196] tipc: TX() has been purged, node left! [ 453.028867][ T196] tipc: TX() has been purged, node left! [ 453.130031][ T196] tipc: TX() has been purged, node left! [ 453.248890][ T196] tipc: TX() has been purged, node left! [ 453.418810][ T196] tipc: TX() has been purged, node left! [ 453.588868][ T196] tipc: TX() has been purged, node left! [ 453.596779][ T196] tipc: TX() has been purged, node left! [ 453.778901][ T196] tipc: TX() has been purged, node left! [ 453.960236][ T196] tipc: TX() has been purged, node left! [ 454.078890][ T196] tipc: TX() has been purged, node left! [ 454.084945][ T196] tipc: TX() has been purged, node left! [ 454.092429][ T196] tipc: TX() has been purged, node left! [ 454.098288][ T196] tipc: TX() has been purged, node left! [ 454.338809][ T196] tipc: TX() has been purged, node left! [ 454.528887][ T196] tipc: TX() has been purged, node left! [ 454.748850][ T196] tipc: TX() has been purged, node left! [ 454.908838][ T196] tipc: TX() has been purged, node left! [ 455.068929][ T196] tipc: TX() has been purged, node left! 21:14:07 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8915, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:07 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:07 executing program 3: r0 = socket(0x0, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:07 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:07 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="9bd06c99ac7d41f03520cee808b2b92779a1ecacb874dd", @ANYRESOCT, @ANYBLOB="9694a77f8e0d7e6c6af6fccd28c6429e956ae597a8a075ec95235522235b5d1cb4a162143b1f06b43475b0bf4cd7ef647bcf6bbf1a357b0e759882d9fd5439fc9dc4ec840759050203df13a585409641dafc95957df9f46833cb85d8c997622ea2c73181af0624d542834b14ea1c98fe07a7957e70b378d67a28f5000f4795f9b94a3dedc40bd9bb", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRES32, @ANYBLOB="50166324cf6c8a3f8ba1cf1b4b1da9b41d8e0d5c72df84ad31142c46edf63cc0dfcb9c9a69e17c7b4e6db036ce850d753ea9c4d11393e81cf3bddc3d940815a2740261ae66f808a0ab1864a70ad563b03c04571e35f720ce672564c5dbaa78ca1f3458cb25a65f9c369ed839bfa3fbeab4a0c6c54fb35633e63df396685d35e076972b41ea9c9601802d1636f6db491711ef03207372d976e3881ff6a1bd4c826268556cf1202fb93d59bdc2364c71ed35fce630f8b056e9b6b2df5c9d82bb98ce9a13abc4164dacc8fafcf25c", @ANYRESHEX=r1, @ANYRESOCT], 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:07 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 455.218816][ T196] tipc: TX() has been purged, node left! [ 455.231691][T22523] IPVS: ftp: loaded support on port[0] = 21 [ 455.301029][ T196] tipc: TX() has been purged, node left! [ 455.307439][ T196] tipc: TX() has been purged, node left! [ 455.331192][ T26] kauditd_printk_skb: 2 callbacks suppressed 21:14:07 executing program 3: r0 = socket(0x0, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 455.331205][ T26] audit: type=1804 audit(1589836447.367:611): pid=22532 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/188/memory.events" dev="sda1" ino=16368 res=1 [ 455.373127][T22535] IPVS: ftp: loaded support on port[0] = 21 21:14:07 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:07 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x40}}, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 455.521680][ T26] audit: type=1800 audit(1589836447.367:612): pid=22532 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16368 res=0 21:14:07 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 455.637189][ T26] audit: type=1804 audit(1589836447.367:613): pid=22532 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/188/memory.events" dev="sda1" ino=16368 res=1 21:14:07 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 455.817415][ T26] audit: type=1804 audit(1589836447.537:614): pid=22532 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/188/memory.events" dev="sda1" ino=16368 res=1 21:14:07 executing program 3: r0 = socket(0x0, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 455.953039][ T26] audit: type=1804 audit(1589836447.937:615): pid=22590 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/189/memory.events" dev="sda1" ino=16378 res=1 [ 456.117090][ T26] audit: type=1800 audit(1589836447.937:616): pid=22590 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16378 res=0 [ 456.181518][ T26] audit: type=1804 audit(1589836447.937:617): pid=22590 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/189/memory.events" dev="sda1" ino=16378 res=1 [ 456.282642][ T26] audit: type=1804 audit(1589836448.117:618): pid=22595 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/189/memory.events" dev="sda1" ino=16378 res=1 [ 456.300261][T22523] IPVS: ftp: loaded support on port[0] = 21 [ 456.466819][T22535] IPVS: ftp: loaded support on port[0] = 21 21:14:09 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:09 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r4}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:09 executing program 3: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:09 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:09 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:09 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8917, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 457.139831][ T26] audit: type=1804 audit(1589836449.177:619): pid=22667 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/190/memory.events" dev="sda1" ino=16372 res=1 21:14:09 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) socket(0x1, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 457.217784][T22670] IPVS: ftp: loaded support on port[0] = 21 21:14:09 executing program 3: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:09 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 457.307269][T22672] IPVS: ftp: loaded support on port[0] = 21 [ 457.316302][ T26] audit: type=1800 audit(1589836449.197:620): pid=22667 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16372 res=0 21:14:09 executing program 3: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:09 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:09 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 458.081365][T22670] IPVS: ftp: loaded support on port[0] = 21 [ 458.265277][T22672] IPVS: ftp: loaded support on port[0] = 21 21:14:10 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8917, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:10 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:10 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:10 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:10 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000940)=@setlink={0x30, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}, @IFLA_NET_NS_FD={0x8}]}, 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r3}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:10 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8919, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 458.748138][T22795] IPVS: ftp: loaded support on port[0] = 21 21:14:10 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:10 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 458.851526][T22802] IPVS: ftp: loaded support on port[0] = 21 21:14:10 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:11 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:11 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:11 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 459.682963][T22795] IPVS: ftp: loaded support on port[0] = 21 [ 459.716373][T22802] IPVS: ftp: loaded support on port[0] = 21 21:14:12 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8919, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:12 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:12 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:12 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:12 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:12 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891a, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 460.459467][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 460.459481][ T26] audit: type=1804 audit(1589836452.497:627): pid=22927 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/192/memory.events" dev="sda1" ino=16377 res=1 21:14:12 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:12 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:12 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 460.592157][ T26] audit: type=1800 audit(1589836452.497:628): pid=22927 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16377 res=0 [ 460.655265][T22936] IPVS: ftp: loaded support on port[0] = 21 [ 460.656687][T22932] IPVS: ftp: loaded support on port[0] = 21 [ 460.793318][ T26] audit: type=1804 audit(1589836452.497:629): pid=22927 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/192/memory.events" dev="sda1" ino=16377 res=1 21:14:12 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:12 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:13 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 460.965996][ T26] audit: type=1804 audit(1589836452.677:630): pid=22933 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/192/memory.events" dev="sda1" ino=16377 res=1 [ 461.093254][ T26] audit: type=1804 audit(1589836453.077:631): pid=22948 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/193/memory.events" dev="sda1" ino=16366 res=1 [ 461.274445][ T26] audit: type=1800 audit(1589836453.077:632): pid=22948 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16366 res=0 [ 461.405030][ T26] audit: type=1804 audit(1589836453.077:633): pid=22948 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/193/memory.events" dev="sda1" ino=16366 res=1 [ 461.469578][ T26] audit: type=1804 audit(1589836453.337:634): pid=22952 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/193/memory.events" dev="sda1" ino=16366 res=1 [ 461.732396][T22969] IPVS: ftp: loaded support on port[0] = 21 [ 461.742814][T22970] IPVS: ftp: loaded support on port[0] = 21 21:14:17 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891a, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:17 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:17 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:17 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891b, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 465.743295][T22993] IPVS: ftp: loaded support on port[0] = 21 [ 465.754694][ T26] audit: type=1804 audit(1589836457.797:635): pid=22996 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/194/memory.events" dev="sda1" ino=16365 res=1 21:14:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 465.808596][T22997] IPVS: ftp: loaded support on port[0] = 21 21:14:17 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 465.907551][ T26] audit: type=1800 audit(1589836457.797:636): pid=22996 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16365 res=0 [ 466.065964][ T26] audit: type=1804 audit(1589836457.817:637): pid=22996 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/194/memory.events" dev="sda1" ino=16365 res=1 21:14:18 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 466.224728][ T26] audit: type=1804 audit(1589836458.067:638): pid=23007 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/194/memory.events" dev="sda1" ino=16365 res=1 21:14:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 466.732678][T22993] IPVS: ftp: loaded support on port[0] = 21 [ 466.794242][T22997] IPVS: ftp: loaded support on port[0] = 21 21:14:19 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891b, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:19 executing program 0: r0 = socket(0x0, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:19 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:19 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:19 executing program 4: r0 = socket(0x0, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:19 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891c, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 467.557463][T23126] IPVS: ftp: loaded support on port[0] = 21 [ 467.581931][ T26] audit: type=1804 audit(1589836459.617:639): pid=23128 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/195/memory.events" dev="sda1" ino=16370 res=1 21:14:19 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:19 executing program 0: r0 = socket(0x0, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:19 executing program 4: r0 = socket(0x0, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 467.677473][T23134] IPVS: ftp: loaded support on port[0] = 21 [ 467.742103][ T26] audit: type=1800 audit(1589836459.647:640): pid=23128 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16370 res=0 [ 467.933306][ T26] audit: type=1804 audit(1589836459.647:641): pid=23128 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/195/memory.events" dev="sda1" ino=16370 res=1 21:14:20 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:20 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:20 executing program 4: r0 = socket(0x0, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 468.097340][ T26] audit: type=1804 audit(1589836459.927:642): pid=23162 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/195/memory.events" dev="sda1" ino=16370 res=1 [ 468.243030][ T26] audit: type=1804 audit(1589836460.277:643): pid=23201 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/196/memory.events" dev="sda1" ino=16380 res=1 [ 468.383415][ T26] audit: type=1800 audit(1589836460.307:644): pid=23201 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16380 res=0 [ 468.596262][T23134] IPVS: ftp: loaded support on port[0] = 21 [ 468.667694][T23126] IPVS: ftp: loaded support on port[0] = 21 21:14:21 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891c, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:21 executing program 0: r0 = socket(0x0, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:21 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:21 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:21 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:21 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x892f, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:21 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 469.411337][T23277] IPVS: ftp: loaded support on port[0] = 21 [ 469.413723][T23276] IPVS: ftp: loaded support on port[0] = 21 21:14:21 executing program 0: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:21 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:21 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:21 executing program 0: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:21 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 470.302332][T23276] IPVS: ftp: loaded support on port[0] = 21 [ 470.398219][T23277] IPVS: ftp: loaded support on port[0] = 21 21:14:22 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x892f, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:22 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:22 executing program 0: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:22 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:22 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 470.914408][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 470.914431][ T26] audit: type=1804 audit(1589836462.947:651): pid=23400 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/198/memory.events" dev="sda1" ino=16375 res=1 [ 470.984587][ T26] audit: type=1800 audit(1589836462.947:652): pid=23400 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16375 res=0 [ 471.007837][T23407] IPVS: ftp: loaded support on port[0] = 21 [ 471.062260][ T26] audit: type=1804 audit(1589836462.957:653): pid=23400 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/198/memory.events" dev="sda1" ino=16375 res=1 [ 471.246123][ T26] audit: type=1804 audit(1589836463.237:654): pid=23420 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/198/memory.events" dev="sda1" ino=16375 res=1 [ 471.594493][T23407] IPVS: ftp: loaded support on port[0] = 21 21:14:25 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8933, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:25 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:25 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:25 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:25 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:25 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8933, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 473.706500][ T26] audit: type=1804 audit(1589836465.737:655): pid=23490 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/199/memory.events" dev="sda1" ino=15987 res=1 [ 473.716477][T23492] IPVS: ftp: loaded support on port[0] = 21 21:14:25 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:25 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:25 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 473.815268][T23495] IPVS: ftp: loaded support on port[0] = 21 [ 473.843945][ T26] audit: type=1800 audit(1589836465.737:656): pid=23490 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=15987 res=0 [ 473.964512][ T26] audit: type=1804 audit(1589836465.737:657): pid=23490 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/199/memory.events" dev="sda1" ino=15987 res=1 21:14:26 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:26 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:26 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 474.168034][ T26] audit: type=1804 audit(1589836466.027:658): pid=23503 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/199/memory.events" dev="sda1" ino=15987 res=1 [ 474.310720][ T26] audit: type=1804 audit(1589836466.337:659): pid=23553 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/200/memory.events" dev="sda1" ino=16067 res=1 [ 474.440187][ T26] audit: type=1800 audit(1589836466.337:660): pid=23553 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16067 res=0 [ 474.672839][T23495] IPVS: ftp: loaded support on port[0] = 21 [ 474.800442][T23492] IPVS: ftp: loaded support on port[0] = 21 21:14:27 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8934, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:27 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:27 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:27 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:27 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 475.578972][T23630] IPVS: ftp: loaded support on port[0] = 21 21:14:27 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8934, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:27 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:27 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:27 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:27 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:27 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:27 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 475.866167][T23654] IPVS: ftp: loaded support on port[0] = 21 [ 475.947474][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 475.947486][ T26] audit: type=1804 audit(1589836467.977:667): pid=23662 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/202/memory.events" dev="sda1" ino=15922 res=1 [ 476.104947][ T26] audit: type=1800 audit(1589836468.017:668): pid=23662 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=15922 res=0 [ 476.236843][ T26] audit: type=1804 audit(1589836468.017:669): pid=23662 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/202/memory.events" dev="sda1" ino=15922 res=1 [ 476.384379][ T26] audit: type=1804 audit(1589836468.307:670): pid=23687 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/202/memory.events" dev="sda1" ino=15922 res=1 [ 476.582288][T23630] IPVS: ftp: loaded support on port[0] = 21 [ 476.716845][T23654] IPVS: ftp: loaded support on port[0] = 21 21:14:29 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8935, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:29 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:29 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:29 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:29 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 477.414383][ T26] audit: type=1804 audit(1589836469.447:671): pid=23765 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/203/memory.events" dev="sda1" ino=16373 res=1 [ 477.473215][T23768] IPVS: ftp: loaded support on port[0] = 21 [ 477.536568][ T26] audit: type=1800 audit(1589836469.447:672): pid=23765 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16373 res=0 21:14:29 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8935, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:29 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:29 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:29 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 477.749731][ T26] audit: type=1804 audit(1589836469.477:673): pid=23765 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/203/memory.events" dev="sda1" ino=16373 res=1 [ 477.811901][T23796] IPVS: ftp: loaded support on port[0] = 21 21:14:29 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:29 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:30 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 477.943913][ T26] audit: type=1804 audit(1589836469.727:674): pid=23779 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/203/memory.events" dev="sda1" ino=16373 res=1 [ 478.093811][ T26] audit: type=1804 audit(1589836470.127:675): pid=23823 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/204/memory.events" dev="sda1" ino=16382 res=1 [ 478.242477][ T26] audit: type=1800 audit(1589836470.127:676): pid=23823 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16382 res=0 [ 478.528347][T23768] IPVS: ftp: loaded support on port[0] = 21 [ 478.729870][T23796] IPVS: ftp: loaded support on port[0] = 21 21:14:31 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8940, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:31 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:31 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:31 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:31 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 479.302640][T23905] IPVS: ftp: loaded support on port[0] = 21 21:14:31 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8940, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:31 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:31 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:31 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:32 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:14:32 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:32 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 480.080151][T23944] IPVS: ftp: loaded support on port[0] = 21 [ 480.371161][T23905] IPVS: ftp: loaded support on port[0] = 21 21:14:32 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8941, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:32 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:32 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:14:32 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:32 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 480.708418][T23944] IPVS: ftp: loaded support on port[0] = 21 [ 480.889705][T24024] IPVS: ftp: loaded support on port[0] = 21 [ 481.093368][ T26] kauditd_printk_skb: 13 callbacks suppressed [ 481.093380][ T26] audit: type=1804 audit(1589836473.127:690): pid=24034 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/207/memory.events" dev="sda1" ino=16384 res=1 [ 481.546529][T24024] IPVS: ftp: loaded support on port[0] = 21 21:14:35 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8941, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:35 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:14:35 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:35 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:35 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:35 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x894c, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 483.349999][ T26] audit: type=1804 audit(1589836475.387:691): pid=24107 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/208/memory.events" dev="sda1" ino=16374 res=1 [ 483.367615][T24108] IPVS: ftp: loaded support on port[0] = 21 21:14:35 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:35 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 483.511093][ T26] audit: type=1800 audit(1589836475.387:692): pid=24107 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16374 res=0 [ 483.524328][T24118] IPVS: ftp: loaded support on port[0] = 21 21:14:35 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 483.698360][ T26] audit: type=1804 audit(1589836475.387:693): pid=24107 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/208/memory.events" dev="sda1" ino=16374 res=1 21:14:35 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:35 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:35 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 483.885708][ T26] audit: type=1804 audit(1589836475.637:694): pid=24120 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/208/memory.events" dev="sda1" ino=16374 res=1 [ 484.014820][ T26] audit: type=1804 audit(1589836476.037:695): pid=24173 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/209/memory.events" dev="sda1" ino=16383 res=1 [ 484.107494][ T26] audit: type=1800 audit(1589836476.037:696): pid=24173 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16383 res=0 [ 484.209202][ T26] audit: type=1804 audit(1589836476.047:697): pid=24173 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/209/memory.events" dev="sda1" ino=16383 res=1 [ 484.333392][ T26] audit: type=1804 audit(1589836476.287:698): pid=24176 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/209/memory.events" dev="sda1" ino=16383 res=1 [ 484.417872][T24118] IPVS: ftp: loaded support on port[0] = 21 [ 484.441867][T24108] IPVS: ftp: loaded support on port[0] = 21 21:14:37 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x894c, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:37 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00'}) bind$packet(r0, &(0x7f0000000080), 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:37 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:37 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:37 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 485.121649][ T26] audit: type=1804 audit(1589836477.157:699): pid=24242 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/210/memory.events" dev="sda1" ino=16372 res=1 [ 485.235319][T24247] IPVS: ftp: loaded support on port[0] = 21 21:14:37 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8953, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:37 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:37 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:37 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:37 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:37 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:37 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 485.695872][T24264] IPVS: ftp: loaded support on port[0] = 21 [ 486.352108][T24276] IPVS: ftp: loaded support on port[0] = 21 [ 486.448220][T24278] IPVS: ftp: loaded support on port[0] = 21 21:14:42 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:42 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:42 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8953, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:42 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:42 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:42 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8955, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 490.569790][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 490.569803][ T26] audit: type=1804 audit(1589836482.607:703): pid=24301 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/211/memory.events" dev="sda1" ino=16373 res=1 [ 490.609806][ T26] audit: type=1800 audit(1589836482.607:704): pid=24301 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16373 res=0 [ 490.663443][T24302] IPVS: ftp: loaded support on port[0] = 21 [ 490.678196][T24305] IPVS: ftp: loaded support on port[0] = 21 21:14:42 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:42 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 490.712823][ T26] audit: type=1804 audit(1589836482.607:705): pid=24301 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/211/memory.events" dev="sda1" ino=16373 res=1 21:14:42 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 490.886944][ T26] audit: type=1804 audit(1589836482.867:706): pid=24315 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/211/memory.events" dev="sda1" ino=16373 res=1 21:14:43 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:43 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:43 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:43 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:43 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 491.476113][T24302] IPVS: ftp: loaded support on port[0] = 21 [ 491.596680][ T26] audit: type=1804 audit(1589836483.627:707): pid=24377 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/212/memory.events" dev="sda1" ino=16371 res=1 [ 491.703610][ T26] audit: type=1800 audit(1589836483.667:708): pid=24377 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16371 res=0 [ 491.839461][ T26] audit: type=1804 audit(1589836483.667:709): pid=24377 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/212/memory.events" dev="sda1" ino=16371 res=1 [ 491.936363][T24305] IPVS: ftp: loaded support on port[0] = 21 [ 492.024510][ T26] audit: type=1804 audit(1589836483.897:710): pid=24402 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/212/memory.events" dev="sda1" ino=16371 res=1 21:14:44 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8954, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:44 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:44 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 492.402845][T24438] IPVS: ftp: loaded support on port[0] = 21 21:14:44 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x895d, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:44 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:14:44 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:44 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:44 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 492.870185][ T26] audit: type=1804 audit(1589836484.907:711): pid=24468 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/213/memory.events" dev="sda1" ino=16375 res=1 [ 492.933087][T24473] IPVS: ftp: loaded support on port[0] = 21 21:14:45 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:14:45 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 492.991710][ T26] audit: type=1800 audit(1589836484.937:712): pid=24468 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16375 res=0 21:14:45 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 493.088267][T24438] IPVS: ftp: loaded support on port[0] = 21 21:14:45 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 493.942839][T24473] IPVS: ftp: loaded support on port[0] = 21 21:14:46 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8955, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:46 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:46 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 494.355847][T24570] IPVS: ftp: loaded support on port[0] = 21 21:14:46 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8980, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:46 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:46 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:46 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:46 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 494.739003][T24605] IPVS: ftp: loaded support on port[0] = 21 21:14:46 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:14:46 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:46 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:47 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 495.185995][T24570] IPVS: ftp: loaded support on port[0] = 21 [ 495.791055][T24605] IPVS: ftp: loaded support on port[0] = 21 21:14:48 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8980, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:48 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:48 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:48 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:14:48 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:48 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8981, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 496.291570][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 496.291583][ T26] audit: type=1804 audit(1589836488.327:723): pid=24714 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/216/memory.events" dev="sda1" ino=16372 res=1 [ 496.323082][T24720] IPVS: ftp: loaded support on port[0] = 21 21:14:48 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 496.381108][T24719] IPVS: ftp: loaded support on port[0] = 21 21:14:48 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:48 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 496.480805][ T26] audit: type=1800 audit(1589836488.377:724): pid=24714 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16372 res=0 [ 496.592715][ T26] audit: type=1804 audit(1589836488.377:725): pid=24714 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/216/memory.events" dev="sda1" ino=16372 res=1 21:14:48 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:48 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:48 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 496.792497][ T26] audit: type=1804 audit(1589836488.607:726): pid=24733 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/216/memory.events" dev="sda1" ino=16372 res=1 [ 496.942833][ T26] audit: type=1804 audit(1589836488.947:727): pid=24779 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/217/memory.events" dev="sda1" ino=16376 res=1 [ 497.030095][ T26] audit: type=1800 audit(1589836488.957:728): pid=24779 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16376 res=0 [ 497.135697][ T26] audit: type=1804 audit(1589836488.957:729): pid=24779 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/217/memory.events" dev="sda1" ino=16376 res=1 [ 497.182902][ T26] audit: type=1804 audit(1589836489.207:730): pid=24784 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/217/memory.events" dev="sda1" ino=16376 res=1 [ 497.195441][T24720] IPVS: ftp: loaded support on port[0] = 21 [ 497.487862][T24719] IPVS: ftp: loaded support on port[0] = 21 21:14:49 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8981, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:49 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:49 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:49 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:49 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:50 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8982, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 498.054414][ T26] audit: type=1804 audit(1589836490.087:731): pid=24848 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/218/memory.events" dev="sda1" ino=16367 res=1 [ 498.088354][T24849] IPVS: ftp: loaded support on port[0] = 21 21:14:50 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:50 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:50 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 498.191214][ T26] audit: type=1800 audit(1589836490.087:732): pid=24848 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16367 res=0 [ 498.327272][T24864] IPVS: ftp: loaded support on port[0] = 21 21:14:50 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:50 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:50 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 499.104876][T24864] IPVS: ftp: loaded support on port[0] = 21 [ 499.132330][T24849] IPVS: ftp: loaded support on port[0] = 21 21:14:51 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8982, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:51 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:51 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:51 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:51 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8983, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:52 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:52 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 499.911250][T24982] IPVS: ftp: loaded support on port[0] = 21 [ 500.091843][T24990] IPVS: ftp: loaded support on port[0] = 21 21:14:52 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:52 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:52 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 500.886426][T24982] IPVS: ftp: loaded support on port[0] = 21 [ 500.974535][T24990] IPVS: ftp: loaded support on port[0] = 21 21:14:53 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8983, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:53 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:53 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:53 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:53 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:53 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89a0, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 501.677708][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 501.677721][ T26] audit: type=1804 audit(1589836493.707:743): pid=25117 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/221/memory.events" dev="sda1" ino=16377 res=1 [ 501.717844][ T26] audit: type=1800 audit(1589836493.747:744): pid=25117 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16377 res=0 21:14:53 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:53 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 501.785748][T25121] IPVS: ftp: loaded support on port[0] = 21 [ 501.822120][T25122] IPVS: ftp: loaded support on port[0] = 21 21:14:53 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 501.853539][ T26] audit: type=1804 audit(1589836493.747:745): pid=25117 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/221/memory.events" dev="sda1" ino=16377 res=1 [ 502.059499][ T26] audit: type=1804 audit(1589836494.077:746): pid=25143 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/221/memory.events" dev="sda1" ino=16377 res=1 21:14:54 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:54 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:54 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 502.421260][ T26] audit: type=1804 audit(1589836494.457:747): pid=25185 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/204/memory.events" dev="sda1" ino=16381 res=1 [ 502.544052][ T26] audit: type=1800 audit(1589836494.487:748): pid=25185 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16381 res=0 [ 502.622270][ T26] audit: type=1804 audit(1589836494.487:749): pid=25185 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/204/memory.events" dev="sda1" ino=16381 res=1 [ 502.674520][ T26] audit: type=1804 audit(1589836494.707:750): pid=25190 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir849644982/syzkaller.Lle1Dk/204/memory.events" dev="sda1" ino=16381 res=1 [ 502.803182][T25121] IPVS: ftp: loaded support on port[0] = 21 [ 503.013875][T25122] IPVS: ftp: loaded support on port[0] = 21 21:14:55 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89a0, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:55 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:55 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:55 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:55 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 503.748212][ T26] audit: type=1804 audit(1589836495.777:751): pid=25257 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/222/memory.events" dev="sda1" ino=16380 res=1 [ 503.853737][ T26] audit: type=1800 audit(1589836495.777:752): pid=25257 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16380 res=0 [ 503.922529][T25264] IPVS: ftp: loaded support on port[0] = 21 21:14:56 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:56 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:56 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:56 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:56 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 504.478564][T25305] IPVS: ftp: loaded support on port[0] = 21 21:14:56 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:56 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8980, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 504.776329][T25326] IPVS: ftp: loaded support on port[0] = 21 [ 504.927785][T25264] IPVS: ftp: loaded support on port[0] = 21 [ 505.305147][T25305] IPVS: ftp: loaded support on port[0] = 21 21:14:57 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:57 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8935, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:57 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:57 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:57 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 506.054531][T25432] IPVS: ftp: loaded support on port[0] = 21 [ 506.140564][T25433] IPVS: ftp: loaded support on port[0] = 21 21:14:58 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89c0, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:58 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:58 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:58 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:58 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:58 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 506.587518][T25488] IPVS: ftp: loaded support on port[0] = 21 21:14:58 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 506.903173][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 506.903186][ T26] audit: type=1804 audit(1589836498.937:770): pid=25507 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/225/memory.events" dev="sda1" ino=16376 res=1 [ 507.267569][T25433] IPVS: ftp: loaded support on port[0] = 21 [ 507.436492][T25488] IPVS: ftp: loaded support on port[0] = 21 21:14:59 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89c0, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:14:59 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:14:59 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:14:59 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:14:59 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8935, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 508.010580][ T26] audit: type=1804 audit(1589836500.047:771): pid=25586 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/226/memory.events" dev="sda1" ino=16377 res=1 [ 508.043204][T25590] IPVS: ftp: loaded support on port[0] = 21 [ 508.065557][T25588] IPVS: ftp: loaded support on port[0] = 21 [ 508.154058][ T26] audit: type=1800 audit(1589836500.077:772): pid=25586 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16377 res=0 [ 508.330943][ T26] audit: type=1804 audit(1589836500.087:773): pid=25586 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/226/memory.events" dev="sda1" ino=16377 res=1 [ 508.489917][ T26] audit: type=1804 audit(1589836500.337:774): pid=25599 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/226/memory.events" dev="sda1" ino=16377 res=1 21:15:00 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89e2, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:00 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:15:00 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:15:00 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 508.603648][ T26] audit: type=1804 audit(1589836500.627:775): pid=25644 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/227/memory.events" dev="sda1" ino=15889 res=1 21:15:00 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 508.747209][T25648] IPVS: ftp: loaded support on port[0] = 21 [ 508.787036][ T26] audit: type=1800 audit(1589836500.627:776): pid=25644 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=15889 res=0 21:15:00 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 508.982794][ T26] audit: type=1804 audit(1589836500.667:777): pid=25644 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/227/memory.events" dev="sda1" ino=15889 res=1 21:15:01 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 509.186888][ T26] audit: type=1804 audit(1589836500.907:778): pid=25652 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/227/memory.events" dev="sda1" ino=15889 res=1 [ 509.349519][T25590] IPVS: ftp: loaded support on port[0] = 21 [ 509.518462][T25648] IPVS: ftp: loaded support on port[0] = 21 21:15:05 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89e2, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:05 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:15:05 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:15:05 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:15:05 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89c0, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:05 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89ed, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 513.165246][T25762] IPVS: ftp: loaded support on port[0] = 21 [ 513.196950][T25764] IPVS: ftp: loaded support on port[0] = 21 [ 513.230458][ T26] audit: type=1804 audit(1589836505.267:779): pid=25768 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/228/memory.events" dev="sda1" ino=16225 res=1 21:15:05 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:05 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 513.313074][T25778] IPVS: ftp: loaded support on port[0] = 21 [ 513.394756][ T26] audit: type=1800 audit(1589836505.297:780): pid=25768 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16225 res=0 [ 513.519003][T25797] IPVS: ftp: loaded support on port[0] = 21 [ 513.568270][ T26] audit: type=1804 audit(1589836505.297:781): pid=25768 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/228/memory.events" dev="sda1" ino=16225 res=1 [ 513.711673][ T26] audit: type=1804 audit(1589836505.597:782): pid=25813 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/228/memory.events" dev="sda1" ino=16225 res=1 21:15:05 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:15:05 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x0, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:15:06 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500), &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 514.011875][ T26] audit: type=1804 audit(1589836506.047:783): pid=25867 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/229/memory.events" dev="sda1" ino=16274 res=1 [ 514.143424][ T26] audit: type=1800 audit(1589836506.047:784): pid=25867 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16274 res=0 21:15:06 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 514.310618][ T26] audit: type=1804 audit(1589836506.067:785): pid=25867 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/229/memory.events" dev="sda1" ino=16274 res=1 [ 514.425987][T25762] IPVS: ftp: loaded support on port[0] = 21 [ 514.473144][ T26] audit: type=1804 audit(1589836506.307:786): pid=25875 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/229/memory.events" dev="sda1" ino=16274 res=1 [ 514.580148][T25778] IPVS: ftp: loaded support on port[0] = 21 21:15:07 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0xb702, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:07 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:15:07 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) 21:15:07 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x892f, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:07 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) getsockname$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed6}, 0x56) [ 515.494282][ T26] audit: type=1804 audit(1589836507.527:787): pid=25950 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/230/memory.events" dev="sda1" ino=16380 res=1 [ 515.515835][T25951] IPVS: ftp: loaded support on port[0] = 21 [ 515.587962][T25953] IPVS: ftp: loaded support on port[0] = 21 [ 515.615405][ T26] audit: type=1800 audit(1589836507.557:788): pid=25950 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16380 res=0 [ 516.323990][T25953] IPVS: ftp: loaded support on port[0] = 21 21:15:09 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x400454c9, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:09 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x891c, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:09 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:15:09 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={0x0}}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:15:09 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8919, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:09 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x400454ca, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) [ 517.981507][T26047] IPVS: ftp: loaded support on port[0] = 21 [ 518.062751][T26053] IPVS: ftp: loaded support on port[0] = 21 [ 518.072855][T26052] IPVS: ftp: loaded support on port[0] = 21 [ 518.202634][T26062] IPVS: ftp: loaded support on port[0] = 21 [ 518.285033][ T26] kauditd_printk_skb: 9 callbacks suppressed [ 518.285046][ T26] audit: type=1804 audit(1589836510.317:798): pid=26081 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/231/memory.events" dev="sda1" ino=16372 res=1 21:15:10 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x44, 0x0, 0x400, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 518.885198][ T26] audit: type=1804 audit(1589836510.917:799): pid=26151 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/232/memory.events" dev="sda1" ino=16381 res=1 21:15:11 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000080)={0x3, @null, 0xee01}) [ 518.985528][ T26] audit: type=1800 audit(1589836510.917:800): pid=26151 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16381 res=0 [ 519.079827][ T26] audit: type=1804 audit(1589836510.927:801): pid=26151 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/232/memory.events" dev="sda1" ino=16381 res=1 [ 519.135723][T26052] IPVS: ftp: loaded support on port[0] = 21 [ 519.188348][ T26] audit: type=1804 audit(1589836511.217:802): pid=26165 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/232/memory.events" dev="sda1" ino=16381 res=1 [ 519.236326][T26062] IPVS: ftp: loaded support on port[0] = 21 21:15:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x9d, 0x0, &(0x7f0000000080)="0000000000000000000000001000", 0x0, 0xdc}, 0x28) 21:15:11 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, &(0x7f0000000240)) 21:15:11 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x3c, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 519.908999][ T26] audit: type=1804 audit(1589836511.937:803): pid=26226 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/233/memory.events" dev="sda1" ino=16381 res=1 [ 520.036707][ T26] audit: type=1800 audit(1589836511.947:804): pid=26226 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=16381 res=0 21:15:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) [ 520.210184][ T26] audit: type=1804 audit(1589836511.967:805): pid=26226 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/233/memory.events" dev="sda1" ino=16381 res=1 [ 520.366381][ T26] audit: type=1804 audit(1589836512.227:806): pid=26233 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/233/memory.events" dev="sda1" ino=16381 res=1 21:15:12 executing program 5: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x400454ca, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:12 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x9d}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf93a1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 21:15:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_XOR={0x15, 0x3, {{{}, 0x0, 0x0, 0x0, 0x0, "5334c0cd544e6de1"}}}]}, 0x2c}}, 0x0) 21:15:12 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x3c, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="200027bd7000fedb00000008010000000000000000020014000100fe880000000000000000000047da5663afc886200000000108000700d9000000080008002e00000005000d000300000075a68e4442482ca7f2e6910560f5c0028e39c4befbc53d514194f010340da6ac2b68b494d35a4396a4238bdb5a8638cc78276b9fd42ed57030abcf107000407a32c1539fd52ebef7c9b95ca1e3f34bd1a2332c4ab9968d98b3ec352d89e9093046e049d43a6c3b1f1a7464d4207f58cac387f51851e2a3a50967c9d2942ff7b62554b0588370426e4f4ff5b14454b5b09416f70eb238967bba32168c730d4b4bb46a04fda5f5bca4bddf40af7f92938a7484052a340c73b1cc5d97c17c1e6dff51e463f18f5337ea8bdb9b0a0a75eaf590cd24701d91bd442a3836ce3314867700a9ec2e20fdd2ab472a053ff63fb6ef8130d69fed01961a1bfefa5bb0a4fffebae413"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) 21:15:12 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x400454dc, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @empty}}) 21:15:12 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206040208000001028140003900090035", 0x21}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xffb8) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 520.851157][ T26] audit: type=1804 audit(1589836512.887:807): pid=26250 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir716498148/syzkaller.ewxTeX/234/memory.events" dev="sda1" ino=15736 res=1 21:15:13 executing program 0: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x9d}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf93a1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 21:15:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050012004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00006700090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x24, 0x29, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x4}}}, 0x24}}, 0x0) [ 521.248068][T26270] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 21:15:13 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, 0x0}, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000001780)={0x3c, 0x0, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40c}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x14}, 0x4c000) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20008801) socket$inet_sctp(0x2, 0x0, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) [ 521.305060][T26275] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 526.840549][ T0] NOHZ: local_softirq_pending 08 [ 526.845959][ T0] NOHZ: local_softirq_pending 08 [ 529.400550][ T0] NOHZ: local_softirq_pending 08 [ 538.365652][ T0] NOHZ: local_softirq_pending 08 [ 558.840796][ T0] NOHZ: local_softirq_pending 08 [ 587.641390][ T0] NOHZ: local_softirq_pending 08 [ 599.159878][ T0] NOHZ: local_softirq_pending 08 [ 608.775367][ T0] NOHZ: local_softirq_pending 08 [ 619.640758][ T0] NOHZ: local_softirq_pending 08 [ 628.601009][ T0] NOHZ: local_softirq_pending 08 [ 677.879257][ T1141] INFO: task syz-executor.4:26223 blocked for more than 143 seconds. [ 677.887461][ T1141] Not tainted 5.7.0-rc5-syzkaller #0 [ 677.893658][ T1141] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 677.902385][ T1141] syz-executor.4 D29600 26223 7486 0x00000004 [ 677.908773][ T1141] Call Trace: [ 677.912195][ T1141] ? __schedule+0x937/0x1ff0 [ 677.916799][ T1141] ? rwsem_down_write_slowpath+0x90a/0xf90 [ 677.923182][ T1141] ? __sched_text_start+0x8/0x8 [ 677.928157][ T1141] ? schedule+0xd0/0x2a0 [ 677.932527][ T1141] ? rwsem_down_write_slowpath+0x706/0xf90 [ 677.938338][ T1141] ? pcpu_alloc+0xfed/0x13b0 [ 677.943328][ T1141] ? rwsem_mark_wake+0x8d0/0x8d0 [ 677.948294][ T1141] ? lock_acquire+0x1f2/0x8f0 [ 677.953204][ T1141] ? register_netdevice_notifier+0x1e/0x270 [ 677.961776][ T1141] ? lock_release+0x800/0x800 [ 677.966574][ T1141] ? down_write+0x137/0x150 [ 677.972377][ T1141] ? down_write+0xb2/0x150 [ 677.976787][ T1141] ? down_write+0x137/0x150 [ 677.981690][ T1141] ? __down_timeout+0x2d0/0x2d0 [ 677.986537][ T1141] ? pcpu_alloc+0x128/0x13b0 [ 677.991539][ T1141] ? register_netdevice_notifier+0x1e/0x270 [ 677.997493][ T1141] ? raw_init+0x296/0x340 [ 678.002251][ T1141] ? raw_sock_no_ioctlcmd+0x10/0x10 [ 678.007446][ T1141] ? can_create+0x27c/0x500 [ 678.012257][ T1141] ? __sock_create+0x3cb/0x730 [ 678.017034][ T1141] ? __sys_socket+0xef/0x200 [ 678.021743][ T1141] ? move_addr_to_kernel+0x70/0x70 [ 678.026930][ T1141] ? __x64_sys_clock_gettime+0x165/0x240 [ 678.032625][ T1141] ? __ia32_sys_clock_settime+0x260/0x260 [ 678.038379][ T1141] ? trace_hardirqs_off_caller+0x55/0x230 [ 678.044745][ T1141] ? __x64_sys_socket+0x6f/0xb0 [ 678.049717][ T1141] ? lockdep_hardirqs_on+0x463/0x620 [ 678.055028][ T1141] ? do_syscall_64+0xf6/0x7d0 [ 678.059794][ T1141] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 678.065887][ T1141] INFO: task syz-executor.4:26225 blocked for more than 143 seconds. [ 678.075101][ T1141] Not tainted 5.7.0-rc5-syzkaller #0 [ 678.081010][ T1141] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 678.089818][ T1141] syz-executor.4 D29600 26225 7486 0x00000004 [ 678.096261][ T1141] Call Trace: [ 678.099634][ T1141] ? __schedule+0x937/0x1ff0 [ 678.104221][ T1141] ? rwsem_down_write_slowpath+0x90a/0xf90 [ 678.110112][ T1141] ? __sched_text_start+0x8/0x8 [ 678.114964][ T1141] ? schedule+0xd0/0x2a0 [ 678.119621][ T1141] ? rwsem_down_write_slowpath+0x706/0xf90 [ 678.125449][ T1141] ? pcpu_alloc+0xfed/0x13b0 [ 678.130115][ T1141] ? rwsem_mark_wake+0x8d0/0x8d0 [ 678.135055][ T1141] ? lock_acquire+0x1f2/0x8f0 [ 678.139840][ T1141] ? register_netdevice_notifier+0x1e/0x270 [ 678.145735][ T1141] ? lock_release+0x800/0x800 [ 678.150518][ T1141] ? down_write+0x137/0x150 [ 678.155019][ T1141] ? down_write+0xb2/0x150 [ 678.159508][ T1141] ? down_write+0x137/0x150 [ 678.164008][ T1141] ? __down_timeout+0x2d0/0x2d0 [ 678.168955][ T1141] ? pcpu_alloc+0x128/0x13b0 [ 678.173563][ T1141] ? register_netdevice_notifier+0x1e/0x270 [ 678.181089][ T1141] ? raw_init+0x296/0x340 [ 678.185419][ T1141] ? raw_sock_no_ioctlcmd+0x10/0x10 [ 678.190718][ T1141] ? can_create+0x27c/0x500 [ 678.195221][ T1141] ? __sock_create+0x3cb/0x730 [ 678.201005][ T1141] ? __sys_socket+0xef/0x200 [ 678.205601][ T1141] ? move_addr_to_kernel+0x70/0x70 [ 678.210807][ T1141] ? __x64_sys_clock_gettime+0x165/0x240 [ 678.216437][ T1141] ? __ia32_sys_clock_settime+0x260/0x260 [ 678.222398][ T1141] ? trace_hardirqs_off_caller+0x55/0x230 [ 678.228128][ T1141] ? __x64_sys_socket+0x6f/0xb0 [ 678.233088][ T1141] ? lockdep_hardirqs_on+0x463/0x620 [ 678.238375][ T1141] ? do_syscall_64+0xf6/0x7d0 [ 678.243128][ T1141] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 678.249361][ T1141] [ 678.249361][ T1141] Showing all locks held in the system: [ 678.257086][ T1141] 3 locks held by kworker/u4:5/196: [ 678.262833][ T1141] #0: ffff8880a9771938 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 [ 678.273266][ T1141] #1: ffffc90001777dc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 [ 678.283575][ T1141] #2: ffffffff8a5772f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 [ 678.293880][ T1141] 1 lock held by khungtaskd/1141: [ 678.299007][ T1141] #0: ffffffff899bea80 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 678.309006][ T1141] 1 lock held by in:imklog/6924: [ 678.313986][ T1141] #0: ffff8880a78c9db0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 678.323236][ T1141] 1 lock held by syz-executor.4/26223: [ 678.328763][ T1141] #0: ffffffff8a5772f0 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x270 [ 678.339550][ T1141] 1 lock held by syz-executor.4/26225: [ 678.344989][ T1141] #0: ffffffff8a5772f0 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x270 [ 678.355734][ T1141] [ 678.358058][ T1141] ============================================= [ 678.358058][ T1141] [ 678.368011][ T1141] NMI backtrace for cpu 0 [ 678.372463][ T1141] CPU: 0 PID: 1141 Comm: khungtaskd Not tainted 5.7.0-rc5-syzkaller #0 [ 678.380720][ T1141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.390757][ T1141] Call Trace: [ 678.394031][ T1141] dump_stack+0x188/0x20d [ 678.398398][ T1141] nmi_cpu_backtrace.cold+0x70/0xb1 [ 678.403631][ T1141] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 678.409239][ T1141] nmi_trigger_cpumask_backtrace+0x231/0x27e [ 678.415212][ T1141] watchdog+0xa8c/0x1010 [ 678.419433][ T1141] ? reset_hung_task_detector+0x30/0x30 [ 678.424977][ T1141] kthread+0x388/0x470 [ 678.429036][ T1141] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 678.434751][ T1141] ret_from_fork+0x24/0x30 [ 678.439482][ T1141] Sending NMI from CPU 0 to CPUs 1: [ 678.445043][ C1] NMI backtrace for cpu 1 [ 678.445049][ C1] CPU: 1 PID: 4103 Comm: systemd-journal Not tainted 5.7.0-rc5-syzkaller #0 [ 678.445055][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.445059][ C1] RIP: 0010:should_fail+0x4c/0x633 [ 678.445069][ C1] Code: 10 b3 8a b5 41 4c 8d 64 24 10 48 c7 44 24 18 e4 b5 45 89 49 c1 ec 03 48 c7 44 24 20 e0 87 a9 83 49 8d 04 14 c7 00 f1 f1 f1 f1 40 04 04 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 44 24 68 31 [ 678.445073][ C1] RSP: 0018:ffffc900015f7d08 EFLAGS: 00000a06 [ 678.445081][ C1] RAX: fffff520002befa3 RBX: ffffffff89a77360 RCX: 0000000000000000 [ 678.445086][ C1] RDX: dffffc0000000000 RSI: 0000000000001000 RDI: ffffffff89a77360 [ 678.445106][ C1] RBP: ffff8880aa1eb000 R08: 0000000000000001 R09: fffffbfff1512b31 [ 678.445111][ C1] R10: ffffffff8a895987 R11: fffffbfff1512b30 R12: 1ffff920002befa3 [ 678.445115][ C1] R13: 0000000000001000 R14: 0000000000000400 R15: ffffffff8a898908 [ 678.445121][ C1] FS: 00007fd53c4878c0(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 678.445125][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 678.445130][ C1] CR2: 00007fd539a47000 CR3: 00000000951be000 CR4: 00000000001406e0 [ 678.445135][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 678.445139][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 678.445142][ C1] Call Trace: [ 678.445146][ C1] ? lock_downgrade+0x840/0x840 [ 678.445150][ C1] ? fault_create_debugfs_attr+0x140/0x140 [ 678.445153][ C1] should_failslab+0x5/0xf [ 678.445171][ C1] kmem_cache_alloc+0x29b/0x740 [ 678.445175][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 678.445178][ C1] getname_flags+0xd2/0x5b0 [ 678.445182][ C1] do_mkdirat+0x8d/0x280 [ 678.445185][ C1] ? __ia32_sys_mknod+0xb0/0xb0 [ 678.445189][ C1] ? trace_hardirqs_off_caller+0x55/0x230 [ 678.445207][ C1] do_syscall_64+0xf6/0x7d0 [ 678.445211][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 678.445214][ C1] RIP: 0033:0x7fd53b743687 [ 678.445238][ C1] Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 [ 678.445257][ C1] RSP: 002b:00007fff23544de8 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 [ 678.445265][ C1] RAX: ffffffffffffffda RBX: 00007fff23547e50 RCX: 00007fd53b743687 [ 678.445270][ C1] RDX: 0000000000000000 RSI: 00000000000001ed RDI: 00005565ef2f38a0 [ 678.445275][ C1] RBP: 00007fff23544e20 R08: 00005565edae23e5 R09: 0000000000000018 [ 678.445294][ C1] R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 [ 678.445299][ C1] R13: 0000000000000001 R14: 00005565ef2f38a0 R15: 00007fff23545460 [ 678.452036][ T1141] Kernel panic - not syncing: hung_task: blocked tasks [ 678.715165][ T1141] CPU: 0 PID: 1141 Comm: khungtaskd Not tainted 5.7.0-rc5-syzkaller #0 [ 678.723370][ T1141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.733400][ T1141] Call Trace: [ 678.736672][ T1141] dump_stack+0x188/0x20d [ 678.741038][ T1141] panic+0x2e3/0x75c [ 678.744920][ T1141] ? add_taint.cold+0x16/0x16 [ 678.749575][ T1141] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 678.755183][ T1141] ? preempt_schedule_thunk+0x16/0x18 [ 678.760527][ T1141] ? watchdog+0xa8c/0x1010 [ 678.764933][ T1141] ? nmi_trigger_cpumask_backtrace+0x214/0x27e [ 678.771089][ T1141] watchdog+0xa9d/0x1010 [ 678.775319][ T1141] ? reset_hung_task_detector+0x30/0x30 [ 678.780844][ T1141] kthread+0x388/0x470 [ 678.784943][ T1141] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 678.790642][ T1141] ret_from_fork+0x24/0x30 [ 678.796452][ T1141] Kernel Offset: disabled [ 678.800799][ T1141] Rebooting in 86400 seconds..