d comm="syz-executor.0" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2299.050317][ T19] usb 2-1: new high-speed USB device number 17 using dummy_hcd 09:42:43 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x1008804, &(0x7f00000001c0)={[{@nls={'nls', 0x3d, 'macromanian'}}, {@session={'session'}}, {@nls={'nls', 0x3d, 'euc-jp'}}]}) 09:42:43 executing program 4: socket(0x2, 0x0, 0xffffffff) 09:42:43 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000002840)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 09:42:43 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x2, 0x0, 0xfffffffffffffe34) io_setup(0xc29e, &(0x7f0000000040)) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000004380)='/dev/fuse\x00', 0x2, 0x0) [ 2299.442041][ T19] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 2299.456441][ T19] usb 2-1: config 1 has an invalid descriptor of length 128, skipping remainder of the config [ 2299.491801][ T19] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 09:42:43 executing program 4: syz_init_net_socket$llc(0x1a, 0x1, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) syz_genetlink_get_family_id$batadv(0x0) [ 2299.722273][ T19] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 2299.743908][ T19] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2299.767750][ T19] usb 2-1: Product: ᬫ裌솈䊏疽਎⅃姿仨虅墷糛༈ [ 2299.780241][ T35] audit: type=1800 audit(1612431763.898:52070): pid=28336 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14278 res=0 errno=0 [ 2299.785184][ T19] usb 2-1: Manufacturer: Л [ 2299.870224][ T19] usb 2-1: SerialNumber: В [ 2299.888644][ T35] audit: type=1800 audit(1612431764.008:52071): pid=28342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2299.948912][ T35] audit: type=1800 audit(1612431764.048:52072): pid=28341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2300.005166][ T35] audit: type=1800 audit(1612431764.108:52073): pid=28352 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14299 res=0 errno=0 [ 2300.210226][ T19] usb 2-1: 0:2 : does not exist [ 2300.219745][ T19] usb 2-1: USB disconnect, device number 17 [ 2300.900083][ T5] usb 2-1: new high-speed USB device number 18 using dummy_hcd [ 2301.280270][ T5] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 2301.289005][ T5] usb 2-1: config 1 has an invalid descriptor of length 128, skipping remainder of the config [ 2301.307336][ T5] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2301.480329][ T5] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 2301.489377][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2301.505453][ T5] usb 2-1: Product: ᬫ裌솈䊏疽਎⅃姿仨虅墷糛༈ [ 2301.516909][ T5] usb 2-1: Manufacturer: Л [ 2301.525585][ T5] usb 2-1: SerialNumber: В 09:42:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d8, 0x4) 09:42:45 executing program 4: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x0, 0x1}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 09:42:45 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d8, 0x4) 09:42:45 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d0, 0x4) 09:42:45 executing program 1: keyctl$search(0xa, 0x0, &(0x7f00000006c0)='syzkaller\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0) 09:42:45 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a1, 0x4) 09:42:46 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x180, &(0x7f0000000400)={&(0x7f00000002c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4, 0x0, 0x0, 0x0, 0xf]}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x48}}, 0x0) [ 2301.820101][ T5] usb 2-1: 0:2 : does not exist [ 2301.839536][ T5] usb 2-1: USB disconnect, device number 18 [ 2301.937516][T28428] IPVS: ftp: loaded support on port[0] = 21 [ 2302.025984][T28430] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 2302.048578][T28430] device ipvlan2 entered promiscuous mode [ 2302.056149][ T19] usb 5-1: new high-speed USB device number 59 using dummy_hcd [ 2302.200654][T28428] IPVS: ftp: loaded support on port[0] = 21 09:42:46 executing program 1: connect$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x336, 0x0, 0x0, 0x0, 0x0, @random="e1b741dc1447"}, 0x10) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r0 = syz_io_uring_setup(0xba7, &(0x7f0000000240)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x8000000) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) 09:42:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a2, 0x4) [ 2302.420052][ T19] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 2302.439870][ T19] usb 5-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config 09:42:46 executing program 1: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) [ 2302.489853][ T19] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 09:42:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4}, {0x9, 0x3}]}, @volatile]}}, &(0x7f00000001c0)=""/129, 0x42, 0x81, 0x1}, 0x20) 09:42:46 executing program 1: socket(0xa, 0x0, 0x81) [ 2302.650030][ T19] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 09:42:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d9, 0x4) [ 2302.701534][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2302.721550][ T19] usb 5-1: Product: syz [ 2302.725775][ T19] usb 5-1: Manufacturer: syz [ 2302.750179][ T19] usb 5-1: SerialNumber: syz [ 2303.089926][ T19] usb 5-1: 0:2 : does not exist [ 2303.110941][ T19] usb 5-1: USB disconnect, device number 59 [ 2303.216129][ T35] audit: type=1800 audit(1612431767.338:52074): pid=28514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14283 res=0 errno=0 [ 2303.292416][ T35] audit: type=1800 audit(1612431767.418:52075): pid=28503 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2303.779730][ T19] usb 5-1: new high-speed USB device number 60 using dummy_hcd [ 2304.139727][ T19] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 2304.148656][ T19] usb 5-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 2304.167088][ T19] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2304.339769][ T19] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 2304.349013][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2304.364618][ T19] usb 5-1: Product: syz [ 2304.368863][ T19] usb 5-1: Manufacturer: syz [ 2304.380881][ T19] usb 5-1: SerialNumber: syz 09:42:48 executing program 4: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x0, 0x1}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 09:42:48 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d9, 0x4) 09:42:48 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d1, 0x4) 09:42:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000da, 0x4) 09:42:48 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 09:42:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a3, 0x4) 09:42:48 executing program 1: syz_io_uring_setup(0xba7, &(0x7f0000000240)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) syz_genetlink_get_family_id$batadv(0x0) [ 2304.703329][ T19] usb 5-1: 0:2 : does not exist [ 2304.727102][ T19] usb 5-1: USB disconnect, device number 60 09:42:49 executing program 1: syz_io_uring_setup(0xba7, &(0x7f0000000240), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000002c0), 0x0) keyctl$search(0xa, 0x0, &(0x7f00000006c0)='syzkaller\x00', &(0x7f0000000700)={'syz', 0x2}, 0x0) 09:42:49 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video37\x00', 0x2, 0x0) 09:42:49 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x6, 0x0) read$usbmon(r0, &(0x7f00000001c0)=""/17, 0x11) [ 2305.139517][ T19] usb 5-1: new high-speed USB device number 61 using dummy_hcd 09:42:49 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x801) ioctl$BLKPG(r0, 0x1269, 0x0) 09:42:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x18, 0x5, &(0x7f0000001180)=ANY=[@ANYRESOCT], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2305.360455][ T35] audit: type=1800 audit(1612431769.489:52076): pid=28553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2305.426867][ T35] audit: type=1800 audit(1612431769.539:52077): pid=28554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14298 res=0 errno=0 [ 2305.472714][ T35] audit: type=1800 audit(1612431769.579:52078): pid=28549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14286 res=0 errno=0 [ 2305.509488][ T19] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 2305.518981][ T35] audit: type=1800 audit(1612431769.599:52079): pid=28555 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14299 res=0 errno=0 [ 2305.541527][ T19] usb 5-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 2305.551831][ T19] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 2305.719497][ T19] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 2305.728557][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2305.745128][ T19] usb 5-1: Product: syz [ 2305.749293][ T19] usb 5-1: Manufacturer: syz [ 2305.758004][ T19] usb 5-1: SerialNumber: syz [ 2306.079525][ T19] usb 5-1: 0:2 : does not exist [ 2306.086908][ T19] usb 5-1: USB disconnect, device number 61 09:42:50 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x20) syz_init_net_socket$llc(0x1a, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x0, 0x18}, 0xc) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) 09:42:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000db, 0x4) 09:42:50 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x20]}, 0x8}) 09:42:50 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d2, 0x4) 09:42:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a4, 0x4) 09:42:50 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000da, 0x4) 09:42:50 executing program 1: syz_io_uring_setup(0xba7, &(0x7f0000000240), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) socket$nl_generic(0x10, 0x3, 0x10) 09:42:50 executing program 4: r0 = socket(0x2, 0xa, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={0x0}}, 0x0) 09:42:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f00000001c0)=""/129, 0x2e, 0x81, 0x1}, 0x20) 09:42:50 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001400)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0xffffffffffffff3f) 09:42:50 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$can_j1939(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={0x0}}, 0x0) 09:42:50 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x2, 0x0, 0xfffffffffffffe34) io_setup(0xc29e, &(0x7f0000000040)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x14542, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000004380)='/dev/fuse\x00', 0x2, 0x0) 09:42:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4}, {}]}]}}, &(0x7f00000001c0)=""/129, 0x36, 0x81, 0x1}, 0x20) [ 2307.193016][ T35] audit: type=1800 audit(1612431771.319:52080): pid=28633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:42:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000dc, 0x4) 09:42:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) socket(0x0, 0x6, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) exit(0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1) 09:42:51 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d3, 0x4) 09:42:51 executing program 1: r0 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) [ 2307.263945][ T35] audit: type=1800 audit(1612431771.359:52081): pid=28634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:42:51 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000db, 0x4) 09:42:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a5, 0x4) 09:42:51 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dri/renderD128\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, 0x0) [ 2307.321535][ T35] audit: type=1800 audit(1612431771.369:52082): pid=28630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14289 res=0 errno=0 09:42:51 executing program 1: io_setup(0xc29e, &(0x7f0000000040)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 2307.356968][ T35] audit: type=1800 audit(1612431771.439:52083): pid=28632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:42:51 executing program 1: socketpair(0x18, 0x0, 0x0, &(0x7f0000000140)) 09:42:51 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004380)='/dev/fuse\x00', 0x2, 0x0) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000002a00)=[&(0x7f0000002180)={0x0, 0x0, 0x0, 0x8, 0x3ff, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 09:42:51 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x2, &(0x7f0000000340)=@string={0x2}}, {0x0, 0x0}]}) 09:42:52 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a6, 0x4) 09:42:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000dd, 0x4) 09:42:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4, 0x5}, {0x0, 0x3}]}, @volatile]}}, &(0x7f00000001c0)=""/129, 0x42, 0x81, 0x1}, 0x20) [ 2308.045159][ T35] audit: type=1800 audit(1612431772.169:52084): pid=28673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14279 res=0 errno=0 09:42:52 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d4, 0x4) 09:42:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000100)=""/220, 0x32, 0xdc, 0x1}, 0x20) 09:42:52 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000dc, 0x4) [ 2308.135315][ T35] audit: type=1800 audit(1612431772.259:52085): pid=28686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14299 res=0 errno=0 [ 2308.149127][T13074] usb 2-1: new high-speed USB device number 19 using dummy_hcd 09:42:52 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000480)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, 0x0, 0x0) 09:42:52 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x4, [{0x2, &(0x7f0000000340)=@string={0x2}}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) [ 2308.439410][T13074] usb 2-1: Using ep0 maxpacket: 32 [ 2308.560778][T13074] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2308.629340][T13074] usb 2-1: language id specifier not provided by device, defaulting to English [ 2308.680941][ T5] usb 5-1: new high-speed USB device number 62 using dummy_hcd 09:42:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000de, 0x4) 09:42:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a7, 0x4) [ 2308.919510][ T5] usb 5-1: Using ep0 maxpacket: 32 [ 2308.959600][T13074] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2308.969171][T13074] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2308.999307][T13074] usb 2-1: Product: syz 09:42:53 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d5, 0x4) [ 2309.022044][T13074] usb 2-1: SerialNumber: syz [ 2309.049256][ T5] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2309.099586][T13074] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 2309.111392][ T5] usb 5-1: language id specifier not provided by device, defaulting to English [ 2309.308041][T19313] usb 2-1: USB disconnect, device number 19 [ 2309.848970][ T5] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2309.858347][ T5] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2309.919575][ T5] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 2310.078876][ T5] usb 2-1: new high-speed USB device number 20 using dummy_hcd [ 2310.120810][T12261] usb 5-1: USB disconnect, device number 62 [ 2310.348875][ T5] usb 2-1: Using ep0 maxpacket: 32 [ 2310.479491][ T5] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2310.529538][ T5] usb 2-1: language id specifier not provided by device, defaulting to English 09:42:54 executing program 1: openat$dlm_control(0xffffffffffffff9c, 0x0, 0x438c00, 0x0) 09:42:54 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000dd, 0x4) 09:42:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000df, 0x4) 09:42:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a8, 0x4) 09:42:54 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d6, 0x4) 09:42:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4}, {0x9}]}, @volatile]}}, &(0x7f00000001c0)=""/129, 0x42, 0x81, 0x1}, 0x20) [ 2310.878751][ T5] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2310.897701][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2310.908777][T19313] usb 5-1: new high-speed USB device number 63 using dummy_hcd [ 2310.952206][ T5] usb 2-1: Product: syz 09:42:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x0, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2310.998825][ T5] usb 2-1: can't set config #1, error -71 [ 2311.012289][ T5] usb 2-1: USB disconnect, device number 20 09:42:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) [ 2311.168726][T19313] usb 5-1: Using ep0 maxpacket: 32 [ 2311.288875][T19313] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2311.348914][T19313] usb 5-1: language id specifier not provided by device, defaulting to English 09:42:55 executing program 4: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={0xffffffffffffffff}, 0x4) 09:42:55 executing program 1: io_setup(0x8, &(0x7f0000000080)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 09:42:55 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x1, 0x1f, 0x6, 0x900, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x40) 09:42:55 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f00000012c0)='/proc/cgroups\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) 09:42:55 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x1, 0x1f, 0x6, 0x900, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x40) [ 2311.588773][T19313] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2311.597928][T19313] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2311.633595][ T35] kauditd_printk_skb: 8 callbacks suppressed [ 2311.633606][ T35] audit: type=1800 audit(1612431775.759:52094): pid=28777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2311.668662][T19313] usb 5-1: can't set config #1, error -71 [ 2311.692556][T19313] usb 5-1: USB disconnect, device number 63 09:42:55 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000de, 0x4) 09:42:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a9, 0x4) 09:42:55 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x103000, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) read$FUSE(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x280001, 0x0) 09:42:55 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d7, 0x4) 09:42:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e0, 0x4) 09:42:55 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x1, 0x1f, 0x6, 0x900, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x40) [ 2311.728990][ T35] audit: type=1800 audit(1612431775.779:52095): pid=28779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14300 res=0 errno=0 [ 2311.753256][ T35] audit: type=1800 audit(1612431775.819:52096): pid=28776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14291 res=0 errno=0 [ 2311.785841][ T35] audit: type=1800 audit(1612431775.819:52097): pid=28778 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:42:56 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) [ 2312.318557][T19313] usb 5-1: new high-speed USB device number 64 using dummy_hcd 09:42:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000aa, 0x4) 09:42:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e1, 0x4) [ 2312.478564][ T35] audit: type=1800 audit(1612431776.600:52098): pid=28836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14292 res=0 errno=0 09:42:56 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d8, 0x4) [ 2312.578549][T19313] usb 5-1: Using ep0 maxpacket: 32 [ 2312.588114][ T35] audit: type=1800 audit(1612431776.710:52099): pid=28839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:42:56 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000df, 0x4) [ 2312.632945][ T35] audit: type=1800 audit(1612431776.720:52100): pid=28840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:42:56 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x103000, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) read$FUSE(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x280001, 0x0) [ 2312.728707][T19313] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2312.938689][T19313] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2312.956848][T19313] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2312.991696][T19313] usb 5-1: Product: syz [ 2313.010056][T19313] usb 5-1: Manufacturer: syz [ 2313.029711][T19313] usb 5-1: SerialNumber: syz [ 2313.109038][T19313] cdc_ether: probe of 5-1:1.0 failed with error -22 09:42:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ab, 0x4) [ 2313.268452][ T35] audit: type=1800 audit(1612431777.390:52101): pid=28852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:42:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e2, 0x4) [ 2313.312988][T22656] usb 5-1: USB disconnect, device number 64 09:42:57 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d9, 0x4) [ 2313.404264][ T35] audit: type=1800 audit(1612431777.530:52102): pid=28867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:42:57 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e0, 0x4) [ 2313.546777][ T35] audit: type=1800 audit(1612431777.670:52103): pid=28868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:42:57 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x103000, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) read$FUSE(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x280001, 0x0) 09:42:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ac, 0x4) [ 2314.088429][T22656] usb 5-1: new high-speed USB device number 65 using dummy_hcd [ 2314.348297][T22656] usb 5-1: Using ep0 maxpacket: 32 [ 2314.468294][T22656] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2314.648508][T22656] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2314.657608][T22656] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2314.667634][T22656] usb 5-1: Product: syz [ 2314.673862][T22656] usb 5-1: Manufacturer: syz [ 2314.684210][T22656] usb 5-1: SerialNumber: syz [ 2314.728856][T22656] cdc_ether: probe of 5-1:1.0 failed with error -22 09:42:59 executing program 4: r0 = syz_io_uring_setup(0xba7, &(0x7f0000000240), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x200000c, 0x12, r0, 0x8000000) syz_io_uring_setup(0x4988, &(0x7f0000000000), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:42:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e3, 0x4) 09:42:59 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000da, 0x4) 09:42:59 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e1, 0x4) 09:42:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ad, 0x4) 09:42:59 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x103000, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) read$FUSE(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x280001, 0x0) [ 2314.927688][ T5] usb 5-1: USB disconnect, device number 65 09:42:59 executing program 4: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000004, 0x30, 0xffffffffffffffff, 0x8000000) 09:42:59 executing program 4: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680), 0x10) 09:42:59 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x3, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x900, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x1, 0x1f, 0x6, 0x900, 0xffffffffffffffff, 0x5, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 09:42:59 executing program 4: socketpair(0x0, 0x3f8195fac5a9a8b1, 0x0, 0x0) 09:42:59 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004380)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002080)={0x2020}, 0xfffffffffffffe9a) 09:42:59 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x7, 0x3, 0x2, 0x6, 0x0, 0x9, {{0x5}, {0x5}, {0xd}}, {[], {}, {{0x9, 0x5, 0x3, 0x2, 0x0, 0x0, 0x0, 0x7}}}}}]}}]}}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x4, [{0x2, &(0x7f0000000340)=@string={0x2}}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) 09:42:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ae, 0x4) 09:42:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e4, 0x4) 09:42:59 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000db, 0x4) 09:42:59 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e2, 0x4) 09:42:59 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 2315.838107][ T5] usb 5-1: new high-speed USB device number 66 using dummy_hcd 09:43:00 executing program 1: r0 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000500)='ceph\x00', &(0x7f0000000540)='-\x00') 09:43:00 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000480)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) 09:43:00 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x1a, 0x118, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x10) socket$can_j1939(0x1d, 0x2, 0x7) socket(0x2, 0x2, 0x850) openat$procfs(0xffffffffffffff9c, &(0x7f00000012c0)='/proc/cgroups\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001340)='batadv\x00') bpf$ITER_CREATE(0x21, 0x0, 0x0) connect$llc(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001680)='batadv\x00') syz_init_net_socket$llc(0x1a, 0x0, 0x0) [ 2316.088389][ T5] usb 5-1: Using ep0 maxpacket: 32 09:43:00 executing program 1: socket$l2tp6(0xa, 0x2, 0x73) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000780)='batadv\x00') 09:43:00 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x20) [ 2316.208356][ T5] usb 5-1: config 1 interface 0 altsetting 7 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2316.226709][ T5] usb 5-1: config 1 interface 0 altsetting 7 bulk endpoint 0x82 has invalid maxpacket 0 [ 2316.268125][ T5] usb 5-1: config 1 interface 0 altsetting 7 endpoint 0x3 has invalid wMaxPacketSize 0 09:43:00 executing program 1: syz_mount_image$romfs(&(0x7f0000000080)='romfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x1400, &(0x7f0000000640)) [ 2316.312307][ T5] usb 5-1: config 1 interface 0 altsetting 7 bulk endpoint 0x3 has invalid maxpacket 0 [ 2316.352840][ T5] usb 5-1: config 1 interface 0 altsetting 7 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 2316.394015][ T5] usb 5-1: config 1 interface 0 has no altsetting 0 [ 2316.448296][ T5] usb 5-1: language id specifier not provided by device, defaulting to English [ 2317.208014][ T5] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2317.217157][ T5] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2317.508439][ T5] cdc_ether: probe of 5-1:1.0 failed with error -22 [ 2317.517455][ T5] usb 5-1: USB disconnect, device number 66 [ 2318.237807][T19313] usb 5-1: new high-speed USB device number 67 using dummy_hcd [ 2318.477781][T19313] usb 5-1: Using ep0 maxpacket: 32 [ 2318.597926][T19313] usb 5-1: config 1 interface 0 altsetting 7 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2318.608687][T19313] usb 5-1: config 1 interface 0 altsetting 7 bulk endpoint 0x82 has invalid maxpacket 0 [ 2318.623722][T19313] usb 5-1: config 1 interface 0 altsetting 7 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2318.638728][T19313] usb 5-1: config 1 interface 0 altsetting 7 bulk endpoint 0x3 has invalid maxpacket 0 [ 2318.648542][T19313] usb 5-1: config 1 interface 0 altsetting 7 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 2318.661525][T19313] usb 5-1: config 1 interface 0 has no altsetting 0 [ 2318.708131][T19313] usb 5-1: language id specifier not provided by device, defaulting to English 09:43:02 executing program 4: bpf$ITER_CREATE(0x21, &(0x7f0000001440), 0x8) 09:43:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4c}}, 0x4000804) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x38, 0x0, 0xb, 0x201, 0x0, 0x0, {0x3}, [@NFTA_COMPAT_NAME={0x11, 0x1, '!!/\\J],-\'%:.\x00'}, @NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x38}}, 0x0) 09:43:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e5, 0x4) 09:43:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000af, 0x4) 09:43:02 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000dc, 0x4) 09:43:02 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e3, 0x4) 09:43:03 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)={@my=0x1}) 09:43:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x4c}}, 0x4000804) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x38, 0x0, 0xb, 0x201, 0x0, 0x0, {0x3}, [@NFTA_COMPAT_NAME={0x11, 0x1, '!!/\\J],-\'%:.\x00'}, @NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}, 0x38}}, 0x0) [ 2318.888101][T19313] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2318.920409][T19313] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 09:43:03 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b80)='net/ipv6_route\x00') 09:43:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCONS(r0, 0x541d) [ 2318.997723][T19313] usb 5-1: can't set config #1, error -71 [ 2319.016823][T19313] usb 5-1: USB disconnect, device number 67 09:43:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='maps\x00') read$FUSE(r0, 0x0, 0x0) 09:43:03 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) syz_mount_image$befs(0x0, &(0x7f0000001840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 09:43:03 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nvme-fabrics\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/67, 0x43}], 0x1, 0x6, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, 0x0, 0x0) 09:43:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002040)='attr/prev\x00') write$FUSE_LSEEK(r0, 0x0, 0x0) [ 2319.548160][ T35] kauditd_printk_skb: 13 callbacks suppressed [ 2319.548171][ T35] audit: type=1800 audit(1612431783.680:52117): pid=29029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:43:03 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000001c0)={0x7, @pix_mp}) 09:43:03 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0xffff0000, 0x2, 0x0, "50eaf2a2e64e0cfde267b0ac1d087e74c9d0424b03be8ae496acc9de65ecae8f"}) [ 2319.617311][ T35] audit: type=1800 audit(1612431783.740:52118): pid=29031 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:03 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000dd, 0x4) 09:43:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e6, 0x4) 09:43:03 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b0, 0x4) 09:43:03 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e4, 0x4) [ 2319.673030][ T35] audit: type=1800 audit(1612431783.740:52119): pid=29028 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:43:03 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0xc000, 0x0) 09:43:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000019c0)='net/ip6_tables_targets\x00') read$FUSE(r0, &(0x7f0000001a00)={0x2020}, 0x2020) [ 2319.722409][ T35] audit: type=1800 audit(1612431783.790:52120): pid=29026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:43:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) 09:43:03 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='sessionid\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1, r2}) 09:43:04 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f0000000180)={0x0, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0], 0x0}) 09:43:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') read$FUSE(r0, 0x0, 0x0) 09:43:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000140)) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000180)) 09:43:04 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0x0, 0x2, 0x0, "50eaf2a2e64e0cfde267b0ac1d087e74c9d0424b03be8ae496acc9de65ecae8f"}) [ 2320.315119][ T35] audit: type=1800 audit(1612431784.441:52121): pid=29073 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14280 res=0 errno=0 [ 2320.459128][ T35] audit: type=1800 audit(1612431784.591:52122): pid=29083 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:43:04 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000de, 0x4) 09:43:04 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000300)) 09:43:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/packet\x00') read$FUSE(r0, 0x0, 0x0) 09:43:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b1, 0x4) 09:43:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e7, 0x4) 09:43:04 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e5, 0x4) [ 2320.507528][ T35] audit: type=1800 audit(1612431784.631:52123): pid=29081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 [ 2320.533501][ T35] audit: type=1800 audit(1612431784.661:52124): pid=29082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000005c0)="7462641e306a08a5e3e2dd46") 09:43:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/66) 09:43:04 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 09:43:04 executing program 1: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd28}) 09:43:04 executing program 4: syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x3, 0x2) 09:43:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000180)={0x6, 0x0, 0x2, 0x0, 0x2}) [ 2320.860969][T29130] "struct vt_consize"->v_vlin is ignored. Please report if you need this. [ 2321.166345][ T35] audit: type=1800 audit(1612431785.291:52125): pid=29109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14287 res=0 errno=0 [ 2321.294385][ T35] audit: type=1800 audit(1612431785.421:52126): pid=29119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:43:05 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000df, 0x4) 09:43:05 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000100)={0x2, @raw_data="c6b18d608ac47f2f9f7ed276d17f75aeee17e30194003ba1e8de5c6758c3915a56972458415b3b64150471cd3a17673fd226f24848dd8b4b7585513676ce2f1dc88620e57715a57f5dddedebfaf3e379dfb1c11e7a5b07540ea9d66ff987584f069d07ba7b29668567999e5a4b9f1d795c24c42f39898c910169fb8a1af38cfa9a35c1ded50f75f7784ac233e65e041fc0c73f034d8396172bd520763f2ecb018cd4d48ecc37a0e98b5ae395a714030cf085f4ae8cf03c7c8474a6a93d5197bffed7d8c8470e46ab"}) 09:43:05 executing program 1: syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x6080, &(0x7f00000001c0)) 09:43:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b2, 0x4) 09:43:05 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e6, 0x4) 09:43:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e8, 0x4) 09:43:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f00000000c0)) 09:43:05 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$x25(r0, &(0x7f00000000c0)={0x9, @remote={[], 0x1}}, 0x12) 09:43:05 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f00000000c0)={0x1f, 0x7, @none, 0x0, 0x1}, 0xe) 09:43:05 executing program 1: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000040)=""/2) 09:43:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002a80)={&(0x7f0000000040), 0xc, &(0x7f0000002a40)=[{&(0x7f0000000080)={0x10}, 0x10}, {&(0x7f00000000c0)={0x18, 0x30, 0x1, 0x0, 0x0, "", [@generic="619cd2b39e"]}, 0x18}], 0x2}, 0x0) 09:43:05 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000100)={0x1f, 0x0, @fixed}, 0xe) [ 2321.679759][T29158] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 09:43:06 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e0, 0x4) 09:43:06 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002380)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000005f00)={0x2020}, 0x2020) 09:43:06 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000080)={0x36, 0x0, 0x8, 0x9}) 09:43:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b3, 0x4) 09:43:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e9, 0x4) 09:43:06 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e7, 0x4) 09:43:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f00000001c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) 09:43:06 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000140)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:43:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000002a80)={0x0, 0x0, &(0x7f0000002a40)=[{0x0}, {&(0x7f00000000c0)={0x18, 0x30, 0x1, 0x0, 0x0, "", [@generic="619cd2b39ea041a0"]}, 0x18}], 0x2}, 0x0) 09:43:06 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000080)={0x36, 0x0, 0x8, 0x9, 0xa23b}) [ 2322.337927][T29183] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 09:43:06 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:'}, &(0x7f0000000100)={0x0, "e4436c2e2f001bc1fbf3539182b4cac3c8525bae1e14dc1cadb80982820380d79d96cdcd20c8bce16084725dc4089ddddbad4547b5456df481a43c16b5b2e2c6"}, 0x48, 0xfffffffffffffffc) keyctl$read(0xb, r0, 0x0, 0x0) 09:43:06 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000180), 0x4) 09:43:07 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e1, 0x4) 09:43:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000000)='\r') 09:43:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00'}) 09:43:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ea, 0x4) 09:43:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b4, 0x4) 09:43:07 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e8, 0x4) 09:43:07 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x2, @pix_mp}) 09:43:07 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000080), 0xe) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) 09:43:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') syz_mount_image$befs(0x0, &(0x7f0000001840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000002140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend='noextend'}]}}) 09:43:07 executing program 4: mq_open(&(0x7f0000000100)='-O\x00', 0x0, 0x0, 0x0) 09:43:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') syz_mount_image$befs(0x0, &(0x7f0000001840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000002140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend='noextend'}]}}) 09:43:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 09:43:07 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e2, 0x4) 09:43:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') syz_mount_image$befs(0x0, &(0x7f0000001840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000002140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend='noextend'}]}}) 09:43:07 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)) 09:43:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000eb, 0x4) 09:43:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b5, 0x4) 09:43:08 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e9, 0x4) 09:43:08 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)) 09:43:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00') syz_mount_image$befs(0x0, &(0x7f0000001840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000002140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend='noextend'}]}}) 09:43:08 executing program 4: ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "9b2a1dd9505490b64906029fac54b2b88128a0"}) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) 09:43:08 executing program 1: socket(0x29, 0x5, 0xc00) 09:43:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') read$FUSE(r0, &(0x7f0000002940)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 09:43:08 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none, 0x1000}, 0xe) 09:43:08 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e3, 0x4) 09:43:08 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x320, 0x80, 0x0, 0x800, 0xff, 0x0, 0x4, 0x1, {0x7}, {}, {}, {}, 0x74191e56efb0416d, 0x0, 0x2, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}) 09:43:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}]}, 0x2c}}, 0x0) 09:43:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ec, 0x4) 09:43:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b6, 0x4) 09:43:08 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ea, 0x4) 09:43:08 executing program 1: socket(0x1, 0x0, 0x1000) 09:43:08 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x2, @sliced}) 09:43:08 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@null=' \x00', 0x0, 'veth0_vlan\x00'}) 09:43:09 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$6lowpan_enable(r0, 0x0, 0x2f) [ 2324.614464][ T35] kauditd_printk_skb: 16 callbacks suppressed [ 2324.614476][ T35] audit: type=1800 audit(1612431788.741:52143): pid=29249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:09 executing program 1: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x0, 0x0) read$dsp(r0, 0x0, 0x0) 09:43:09 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x320, 0x80, 0x0, 0x800, 0xff, 0x0, 0x4, 0x1, {0x7}, {}, {}, {}, 0x74191e56efb0416d, 0x0, 0x2, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}) [ 2325.297780][ T35] audit: type=1800 audit(1612431789.431:52144): pid=29263 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2325.387661][ T35] audit: type=1800 audit(1612431789.431:52145): pid=29264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:43:09 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e4, 0x4) 09:43:09 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x8}, &(0x7f0000000200), 0x0) 09:43:09 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x320, 0x80, 0x0, 0x800, 0xff, 0x0, 0x4, 0x1, {0x7}, {}, {}, {}, 0x74191e56efb0416d, 0x0, 0x2, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}) 09:43:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ed, 0x4) 09:43:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b7, 0x4) [ 2325.490532][ T35] audit: type=1800 audit(1612431789.621:52146): pid=29272 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:43:09 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000eb, 0x4) 09:43:09 executing program 1: unshare(0x12040800) [ 2325.538404][ T35] audit: type=1800 audit(1612431789.651:52147): pid=29277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14273 res=0 errno=0 09:43:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x2, 0x6, 0x185, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}]}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}}, 0x0) 09:43:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') read$FUSE(r0, 0x0, 0x0) 09:43:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "52a4a08cd5573069"}) 09:43:10 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x320, 0x80, 0x0, 0x800, 0xff, 0x0, 0x4, 0x1, {0x7}, {}, {}, {}, 0x74191e56efb0416d, 0x0, 0x2, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}) 09:43:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') read$FUSE(r0, &(0x7f0000002940)={0x2020}, 0xfffffffffffffe96) [ 2326.166696][ T35] audit: type=1800 audit(1612431790.291:52148): pid=29296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2326.275487][ T35] audit: type=1800 audit(1612431790.401:52149): pid=29294 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14289 res=0 errno=0 09:43:10 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e5, 0x4) 09:43:10 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000002c0)={0x0, 0x3f, 0x2, {0x1, @win={{}, 0x0, 0x8, 0x0, 0x0, 0x0}}}) 09:43:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ee, 0x4) 09:43:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b8, 0x4) 09:43:10 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f00000004c0)) 09:43:10 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ec, 0x4) [ 2326.433053][ T35] audit: type=1800 audit(1612431790.561:52150): pid=29303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14281 res=0 errno=0 [ 2326.459742][ T35] audit: type=1800 audit(1612431790.591:52151): pid=29306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:10 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000180)='/dev/video#\x00', 0x7, 0x2) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000001280)={0x0, 0x4, 0x0, {0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}}) 09:43:10 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_CON2FBMAP(r0, 0x4610, 0x0) 09:43:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x1f, 0x4) 09:43:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000180)) 09:43:10 executing program 1: syz_mount_image$befs(0x0, &(0x7f0000001840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) 09:43:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, &(0x7f0000000080)) [ 2327.126671][ T35] audit: type=1800 audit(1612431791.251:52152): pid=29326 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14275 res=0 errno=0 09:43:11 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000080)=0x1) 09:43:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000005c0)="7462641e306a08a5e3") 09:43:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ef, 0x4) 09:43:11 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e6, 0x4) 09:43:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000b9, 0x4) 09:43:11 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ed, 0x4) 09:43:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000005c0)="7462641e306a08a5e3") 09:43:11 executing program 1: shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffe000/0x2000)=nil) 09:43:11 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r0, &(0x7f0000000080), 0x18) 09:43:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000005c0)="7462641e306a08a5e3") 09:43:11 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x100000001) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef}, 0xe) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) 09:43:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000005c0)="7462641e306a08a5e3") 09:43:11 executing program 1: getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:11 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @phonet, @tipc=@name, @xdp}) 09:43:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f0, 0x4) 09:43:12 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e7, 0x4) 09:43:12 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x602, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 09:43:12 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ee, 0x4) 09:43:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats\x00') read$FUSE(r0, 0x0, 0x0) 09:43:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ba, 0x4) 09:43:12 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) 09:43:12 executing program 4: pselect6(0x0, 0x0, 0x0, &(0x7f0000001800), &(0x7f0000001840)={0x0, 0x3938700}, 0x0) 09:43:12 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 09:43:12 executing program 4: read$proc_mixer(0xffffffffffffffff, 0x0, 0x0) 09:43:12 executing program 4: geteuid() r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x0, 0xf8, 0x230, 0xffffffff, 0xffffffff, 0x300, 0x300, 0x300, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@ipv6={@local, @remote, [0x0, 0xffffffff, 0xffffff00, 0xffffff00], [0x0, 0xff, 0xff], 'veth1_to_bond\x00', 'batadv0\x00', {}, {}, 0x84, 0x5}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x4, 0x5, 0x1, [0x7f, 0x20, 0x101, 0x3, 0x3, 0x2, 0xffff, 0x1, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, 0x83e]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@ipv6={@remote, @private0, [0xff, 0xffffffff, 0x0, 0xffffff00], [0xffffff, 0xffffff00, 0xffffffff, 0xffffffff], 'bond_slave_0\x00', 'syzkaller1\x00', {}, {0x101}, 0x3a, 0xff, 0x5, 0x24}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 09:43:12 executing program 4: add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) 09:43:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f1, 0x4) [ 2328.529739][T29411] x_tables: duplicate underflow at hook 2 [ 2328.557996][T29412] x_tables: duplicate underflow at hook 2 09:43:13 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000080)={0x8}, 0x6) 09:43:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000bb, 0x4) 09:43:13 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e8, 0x4) 09:43:13 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ef, 0x4) 09:43:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="f9b00000090100"], 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') mmap$perf(&(0x7f00000aa000/0x2000)=nil, 0x2000, 0x8, 0x13, r1, 0xa423) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000002940)=[{&(0x7f00000001c0)=""/117, 0x75}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f0000001500)=""/235, 0xeb}, {&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f0000001600)=""/203, 0xcb}, {0x0}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000002800)=""/83, 0x53}, {0x0}], 0xa) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) migrate_pages(0x0, 0x8, &(0x7f0000000040), &(0x7f0000000100)) sched_setscheduler(0x0, 0x0, &(0x7f0000000280)=0x401) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x3) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x5, 0x0, [0x564b, 0x7, 0x9, 0x6, 0x1f, 0xfffffff8, 0x5, 0xfffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xc49e]}, {0x0, 0x0, [0x6, 0x2, 0x400, 0x1, 0x0, 0x5, 0x3f, 0x8, 0xff, 0xffffffff, 0x1, 0x8, 0x23a, 0x1, 0x2, 0x9796]}, {0x23, 0x0, [0x7, 0xfffffffd, 0x6, 0x5, 0x3, 0xfa5, 0xcb, 0x8, 0x1, 0x5fa, 0x3, 0x1, 0xfffffffd, 0x9, 0x0, 0xf6]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) 09:43:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 09:43:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="f9b00000090100"], 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') mmap$perf(&(0x7f00000aa000/0x2000)=nil, 0x2000, 0x8, 0x13, r1, 0xa423) readv(r1, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000002940)=[{&(0x7f00000001c0)=""/117, 0x75}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f0000001500)=""/235, 0xeb}, {&(0x7f00000000c0)=""/13, 0xd}, {&(0x7f0000001600)=""/203, 0xcb}, {0x0}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000002800)=""/83, 0x53}, {0x0}], 0xa) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) migrate_pages(0x0, 0x8, &(0x7f0000000040), &(0x7f0000000100)) sched_setscheduler(0x0, 0x0, &(0x7f0000000280)=0x401) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x3) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x5, 0x0, [0x564b, 0x7, 0x9, 0x6, 0x1f, 0xfffffff8, 0x5, 0xfffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xc49e]}, {0x0, 0x0, [0x6, 0x2, 0x400, 0x1, 0x0, 0x5, 0x3f, 0x8, 0xff, 0xffffffff, 0x1, 0x8, 0x23a, 0x1, 0x2, 0x9796]}, {0x23, 0x0, [0x7, 0xfffffffd, 0x6, 0x5, 0x3, 0xfa5, 0xcb, 0x8, 0x1, 0x5fa, 0x3, 0x1, 0xfffffffd, 0x9, 0x0, 0xf6]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) 09:43:13 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x7}, 0x0, &(0x7f00000000c0)={0x8}, &(0x7f0000000100)={0x77359400}, 0x0) 09:43:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000002140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:43:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f2, 0x4) 09:43:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000bc, 0x4) [ 2329.786233][ T35] kauditd_printk_skb: 12 callbacks suppressed [ 2329.786247][ T35] audit: type=1800 audit(1612431793.912:52165): pid=29422 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14292 res=0 errno=0 09:43:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f3, 0x4) [ 2329.832114][ T35] audit: type=1800 audit(1612431793.962:52166): pid=29445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14283 res=0 errno=0 [ 2329.884221][ T35] audit: type=1800 audit(1612431794.012:52167): pid=29435 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:14 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f0, 0x4) 09:43:14 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e9, 0x4) [ 2329.918883][ T35] audit: type=1800 audit(1612431794.042:52168): pid=29425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:43:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x2d8, 0xf0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x208, 0xffffffff, 0xffffffff, 0x208, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xf8, 0x118, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) 09:43:14 executing program 1: add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) [ 2330.101420][T29459] x_tables: duplicate underflow at hook 3 09:43:14 executing program 1: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb1\x00', 0x0, 0x0) mmap$fb(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xe, 0x13, r0, 0x0) 09:43:14 executing program 4: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb1\x00', 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)}) 09:43:14 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000080)=ANY=[], 0x6) 09:43:14 executing program 4: pselect6(0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)={0x0, 0x3938700}, &(0x7f00000018c0)={&(0x7f0000001880)={[0x8001]}, 0x8}) 09:43:14 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) 09:43:14 executing program 1: socket(0xa, 0x5, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2330.506265][ T35] audit: type=1800 audit(1612431794.632:52169): pid=29452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14289 res=0 errno=0 09:43:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000bd, 0x4) 09:43:14 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x8}, 0x0, 0x0) [ 2330.590651][ T35] audit: type=1800 audit(1612431794.712:52170): pid=29450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14281 res=0 errno=0 09:43:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f4, 0x4) [ 2330.811971][ T35] audit: type=1800 audit(1612431794.942:52171): pid=29460 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:43:15 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ea, 0x4) 09:43:15 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f1, 0x4) 09:43:15 executing program 1: clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x6}, 0x0, 0x0, 0x0) [ 2330.876222][ T35] audit: type=1800 audit(1612431794.982:52172): pid=29461 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:15 executing program 1: socketpair(0x3, 0x0, 0x0, &(0x7f0000000580)) 09:43:15 executing program 1: add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 09:43:15 executing program 1: openat$vcsa(0xffffffffffffff9c, &(0x7f0000001180)='/dev/vcsa\x00', 0x60000, 0x0) 09:43:15 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000140)) 09:43:15 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000be, 0x4) 09:43:15 executing program 1: clone3(&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) 09:43:15 executing program 1: pselect6(0x40, &(0x7f00000000c0), &(0x7f00000017c0), 0x0, &(0x7f0000001840)={0x0, 0x3938700}, 0x0) 09:43:15 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)={0x0, 0x3938700}, 0x0) 09:43:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f5, 0x4) [ 2331.539154][ T35] audit: type=1800 audit(1612431795.672:52173): pid=29487 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14288 res=0 errno=0 09:43:15 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000eb, 0x4) [ 2331.655677][ T35] audit: type=1800 audit(1612431795.782:52174): pid=29496 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:15 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f2, 0x4) 09:43:15 executing program 1: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, 0x0) 09:43:15 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x3d0, 0xffffffff, 0x0, 0xf8, 0x230, 0xffffffff, 0xffffffff, 0x300, 0x300, 0x300, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@local, @remote, [], [], 'veth1_to_bond\x00', 'batadv0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hbh={{0x48, 'hbh\x00'}, {0x0, 0x0, 0x0, [0x0, 0x20]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@ipv6={@remote, @private0, [], [], 'bond_slave_0\x00', 'syzkaller1\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 09:43:15 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 09:43:15 executing program 4: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) [ 2331.799184][T29523] x_tables: duplicate underflow at hook 2 09:43:16 executing program 1: keyctl$dh_compute(0x17, &(0x7f0000000000), &(0x7f00000000c0)=""/225, 0xe1, &(0x7f0000000300)={0x0, &(0x7f0000000200)="5e2071b83c5ce0f635757db958b60d8b043c8acdfe85179972136d037f6c9e30e7071986e5c2f01f7f5d856a7036ca83b483f58e5523194bca502d0d258db39765", 0x41}) 09:43:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000bf, 0x4) 09:43:16 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x20101, 0x0) 09:43:16 executing program 1: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000369ddd10341902120887000000010902240001000000000904750002ab21c10009050d1e00f200000009058d020002"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f00000004c0)={0x44, &(0x7f0000000200)={0x0, 0x0, 0x1, 't'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) 09:43:16 executing program 4: r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000280)='ns/time\x00') 09:43:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f6, 0x4) 09:43:16 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ec, 0x4) [ 2332.447490][T22656] usb 2-1: new high-speed USB device number 21 using dummy_hcd 09:43:16 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f3, 0x4) 09:43:16 executing program 4: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000369ddd10341902120887000000010902240001000000000904750002ab21c10009050d1e00f200000009058d020002"], 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) [ 2332.705964][T22656] usb 2-1: Using ep0 maxpacket: 16 09:43:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c0, 0x4) 09:43:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f7, 0x4) [ 2332.844469][T22656] usb 2-1: config 0 has an invalid interface number: 117 but max is 0 [ 2332.867418][T22656] usb 2-1: config 0 has no interface number 0 [ 2332.886807][T12261] usb 5-1: new high-speed USB device number 68 using dummy_hcd [ 2332.911834][T22656] usb 2-1: New USB device found, idVendor=1934, idProduct=1202, bcdDevice=87.08 [ 2332.946123][T22656] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2332.975750][T22656] usb 2-1: config 0 descriptor?? [ 2333.157143][T12261] usb 5-1: Using ep0 maxpacket: 16 [ 2333.286045][T12261] usb 5-1: config 0 has an invalid interface number: 117 but max is 0 [ 2333.299192][T12261] usb 5-1: config 0 has no interface number 0 09:43:17 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ed, 0x4) [ 2333.330328][T12261] usb 5-1: New USB device found, idVendor=1934, idProduct=1202, bcdDevice=87.08 [ 2333.361385][T12261] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 09:43:17 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f4, 0x4) [ 2333.393732][T12261] usb 5-1: config 0 descriptor?? 09:43:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c1, 0x4) 09:43:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f8, 0x4) [ 2334.127671][T12261] f81534 5-1:0.117: f81534_get_register: reg: 1003 failed: -71 [ 2334.135253][T12261] f81534 5-1:0.117: f81534_find_config_idx: read failed: -71 [ 2334.146561][T22656] f81534 2-1:0.117: f81534_set_register: reg: 1002 data: 0 failed: -71 [ 2334.154821][T22656] f81534 2-1:0.117: f81534_find_config_idx: read failed: -71 [ 2334.165069][T12261] f81534 5-1:0.117: f81534_calc_num_ports: find idx failed: -71 [ 2334.181347][T22656] f81534 2-1:0.117: f81534_calc_num_ports: find idx failed: -71 [ 2334.199333][T12261] f81534: probe of 5-1:0.117 failed with error -71 [ 2334.206615][T22656] f81534: probe of 2-1:0.117 failed with error -71 [ 2334.224804][T12261] usb 5-1: USB disconnect, device number 68 [ 2334.231670][T22656] usb 2-1: USB disconnect, device number 21 [ 2334.825697][T12261] usb 5-1: new high-speed USB device number 69 using dummy_hcd [ 2334.833403][T22656] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 2335.075706][T12261] usb 5-1: Using ep0 maxpacket: 16 [ 2335.080999][T22656] usb 2-1: Using ep0 maxpacket: 16 [ 2335.195676][T12261] usb 5-1: config 0 has an invalid interface number: 117 but max is 0 [ 2335.203892][T12261] usb 5-1: config 0 has no interface number 0 [ 2335.210394][T22656] usb 2-1: config 0 has an invalid interface number: 117 but max is 0 [ 2335.222254][T12261] usb 5-1: New USB device found, idVendor=1934, idProduct=1202, bcdDevice=87.08 [ 2335.233601][T22656] usb 2-1: config 0 has no interface number 0 [ 2335.239927][T22656] usb 2-1: New USB device found, idVendor=1934, idProduct=1202, bcdDevice=87.08 [ 2335.249006][T12261] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2335.258476][T22656] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2335.267231][T12261] usb 5-1: config 0 descriptor?? [ 2335.273954][T22656] usb 2-1: config 0 descriptor?? 09:43:19 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) 09:43:19 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ee, 0x4) 09:43:19 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f5, 0x4) 09:43:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c2, 0x4) 09:43:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f9, 0x4) 09:43:19 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:19 executing program 1: clone3(&(0x7f0000000280)={0x2a0030080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2335.625628][T22656] f81534 2-1:0.117: f81534_set_register: reg: 1002 data: 3 failed: -71 [ 2335.641237][T22656] f81534 2-1:0.117: f81534_find_config_idx: read failed: -71 09:43:19 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000db800d21454a67cc0000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aa"], 0x1c2) [ 2335.671849][T22656] f81534 2-1:0.117: f81534_calc_num_ports: find idx failed: -71 09:43:19 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:19 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000db800d21454a67cc0000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aa"], 0x1c2) [ 2335.713233][T22656] f81534: probe of 2-1:0.117 failed with error -71 [ 2335.742169][T22656] usb 2-1: USB disconnect, device number 22 09:43:19 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) [ 2335.785673][T12261] f81534 5-1:0.117: f81534_get_register: reg: 1003 failed: -71 [ 2335.794415][T12261] f81534 5-1:0.117: f81534_find_config_idx: read failed: -71 09:43:20 executing program 1: getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) [ 2335.830654][T12261] f81534 5-1:0.117: f81534_calc_num_ports: find idx failed: -71 [ 2335.864180][T12261] f81534: probe of 5-1:0.117 failed with error -71 09:43:20 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) [ 2335.907119][T12261] usb 5-1: USB disconnect, device number 69 [ 2336.101702][ T35] kauditd_printk_skb: 15 callbacks suppressed [ 2336.101714][ T35] audit: type=1800 audit(1612431800.233:52190): pid=29625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:43:20 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ef, 0x4) [ 2336.278241][ T35] audit: type=1800 audit(1612431800.413:52191): pid=29624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:43:20 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f6, 0x4) 09:43:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c3, 0x4) 09:43:20 executing program 1: keyctl$search(0xa, 0x0, &(0x7f0000000000)='keyring\x00', 0x0, 0xfffffffffffffffc) 09:43:20 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fa, 0x4) 09:43:20 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:20 executing program 1: socketpair(0x26, 0x5, 0x2, &(0x7f0000000000)) 09:43:20 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT2(r0, 0x0, 0xf0ffffff7f0000) 09:43:20 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:20 executing program 1: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) 09:43:20 executing program 4: socket(0xa, 0x5, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) [ 2336.973138][ T35] audit: type=1800 audit(1612431801.103:52192): pid=29675 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:43:21 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f0, 0x4) [ 2337.107726][ T35] audit: type=1800 audit(1612431801.243:52193): pid=29668 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14280 res=0 errno=0 09:43:21 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f7, 0x4) [ 2337.195410][ T35] audit: type=1800 audit(1612431801.313:52194): pid=29676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:43:21 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c4, 0x4) 09:43:21 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x20}, {0x6}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 09:43:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fb, 0x4) [ 2337.247035][ T35] audit: type=1800 audit(1612431801.363:52195): pid=29687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:21 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x109081, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000005fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20023, 0x0) 09:43:21 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x109081, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x20}, {0x6}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) 09:43:21 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x109081, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg(r0, &(0x7f0000000c80), 0x400000000000345, 0x0) [ 2337.888523][ T35] audit: type=1800 audit(1612431802.013:52196): pid=29704 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:43:22 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f1, 0x4) [ 2337.956441][ T35] audit: type=1800 audit(1612431802.073:52197): pid=29698 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14280 res=0 errno=0 [ 2338.010034][ T35] audit: type=1800 audit(1612431802.133:52198): pid=29715 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:22 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f8, 0x4) 09:43:22 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:22 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x2081, 0x0) write$UHID_DESTROY(r0, 0x0, 0x0) 09:43:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fc, 0x4) 09:43:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c5, 0x4) [ 2338.113539][ T35] audit: type=1800 audit(1612431802.233:52199): pid=29713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:43:22 executing program 1: add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000080)="88f4e149dadac4d643ee34402a50ac4cae43446a384048148d7815506a5ed31e57ec9a6ab12aeab526f770c6c1ae66c1b6badba18ed951c4dbce6fa48e40e4132b21b0c533343ece5a4a5c1183e558ca5b95e9dca6b0df78b739e2adec636cb0474711f9c57cddaad1007eb77e6ef900052d1ec339b49a81922749d636ebb86722e3b36f01959437ff512a5bca3d10a901a987914e6cedf270581fd8aaa89967ee03695293dc3754", 0xfffffffffffffc3b, 0xfffffffffffffffa) 09:43:22 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:22 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:22 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f00000000c0), 0xfffffffffffffd94) 09:43:22 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:22 executing program 1: r0 = add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000140)={0x0, "8f29fb7c39e35d62bfc29d42a60b646468dfcaeb1b73cabfef6aa50c0b3f713d6bce537491516841b3492a03f10fb688855b1bc565cf8cda077921ed6f61520f"}, 0x48, r0) 09:43:22 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f2, 0x4) 09:43:23 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000740)={r1}) 09:43:23 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c6, 0x4) 09:43:23 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f9, 0x4) 09:43:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fd, 0x4) 09:43:23 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:43:23 executing program 1: pselect6(0x40, &(0x7f00000000c0), &(0x7f00000017c0), &(0x7f0000001800)={0x7fff}, &(0x7f0000001840)={0x0, 0x3938700}, &(0x7f00000018c0)={&(0x7f0000001880)={[0x8001]}, 0x8}) 09:43:23 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r0, 0x0, 0x1e5) 09:43:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x14}}, 0x0) 09:43:23 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r0, 0x0, 0x1e5) 09:43:23 executing program 1: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x586, 0x4000) 09:43:23 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f3, 0x4) 09:43:23 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r0, 0x0, 0x1e5) 09:43:23 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_INPUT2(r0, &(0x7f0000000080)={0xa}, 0x6) 09:43:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c7, 0x4) 09:43:23 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fa, 0x4) 09:43:23 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000180)={0x0, {'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000100)=""/79, 0x4f}}, 0x120) write$UHID_INPUT2(r0, &(0x7f0000000080), 0x6) 09:43:23 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[], 0x1e5) 09:43:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fe, 0x4) 09:43:24 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x7}, &(0x7f0000000080)={0xaf}, 0x0, 0x0, 0x0) [ 2339.826875][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2339.834415][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2339.885389][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2339.903997][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2339.920327][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2339.935540][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2339.952350][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2339.967476][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2339.984236][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.001119][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.017599][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.034644][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.050364][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.067656][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.094297][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.108516][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.117953][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.125764][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.139392][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.163454][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.178417][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 09:43:24 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f4, 0x4) [ 2340.200059][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.217184][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.224727][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.232519][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.248798][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.269430][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.286556][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.306921][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.324295][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.347652][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.357144][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.365342][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.372854][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 09:43:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c8, 0x4) [ 2340.402291][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.414586][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.446894][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.467202][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.482392][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.492860][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.502198][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.512109][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.525232][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.533409][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.544069][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.552998][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.563264][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.572766][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.582595][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.590859][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.600481][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.610094][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.620870][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.629759][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.640656][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.651560][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.660745][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.670692][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.679588][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.688402][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.697473][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.704889][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.712844][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.721804][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.729705][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.738915][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.748053][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.758634][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.766881][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.777667][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.785984][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.796747][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.804824][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.814788][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.825868][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.833875][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.843511][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.853249][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.862694][T12261] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2340.873167][T12261] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 2340.907101][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2340.917303][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2340.937182][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 09:43:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000102, 0x4) [ 2340.955518][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2340.975561][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2340.995393][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.003286][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.017078][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.037446][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.059876][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.070946][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.078612][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.087452][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.096420][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.103874][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.113133][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.120610][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.130584][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.138415][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.147188][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.154676][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.162163][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.171117][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.178868][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.188033][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.196520][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.210907][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.226636][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.234115][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.242016][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.251167][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.259926][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.268930][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.276779][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.289980][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.301624][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.311797][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.319577][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.335924][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.346275][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.353743][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.362522][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.370844][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.381543][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.390285][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.400747][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.409068][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.418821][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.427229][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.437090][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.445634][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.455968][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.464492][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.474009][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.483835][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.491774][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.502253][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.512324][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.522682][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.532222][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.541726][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.551010][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.559848][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.570216][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.580439][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.589170][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.597836][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.606350][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.618242][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.626851][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.639290][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.647427][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.657893][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.666056][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.673502][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.685470][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.694647][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.705455][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 09:43:25 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x42, 0x0) [ 2341.713396][ T5] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2341.725055][ T5] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 09:43:25 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000001940)={{0x12, 0x1, 0x0, 0x59, 0x4f, 0x9d, 0x10, 0x1c73, 0x861f, 0xdfeb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb7, 0x27, 0xd5}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 09:43:26 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b8000007379"], 0x1e5) 09:43:26 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fb, 0x4) 09:43:26 executing program 4: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb1\x00', 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f0000000380)={0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)}) 09:43:26 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0xe0002, 0x0) write$UHID_INPUT2(r0, 0x0, 0x0) 09:43:26 executing program 4: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) [ 2342.174787][ T5] usb 2-1: new high-speed USB device number 23 using dummy_hcd 09:43:26 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 09:43:26 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e23, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0x7}, @in={0x2, 0x4e24, @rand_addr=0x64010101}, @in6={0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, @in6={0xa, 0x0, 0x8001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}], 0x74) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2342.424757][ T5] usb 2-1: Using ep0 maxpacket: 16 [ 2342.529809][ T35] kauditd_printk_skb: 10 callbacks suppressed [ 2342.529820][ T35] audit: type=1800 audit(1612431806.653:52210): pid=29840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:26 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e23, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0x7}, @in={0x2, 0x4e24, @rand_addr=0x64010101}, @in6={0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, @in6={0xa, 0x0, 0x8001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}], 0x74) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000103, 0x4) 09:43:26 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f5, 0x4) 09:43:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c9, 0x4) [ 2342.619161][ T35] audit: type=1800 audit(1612431806.743:52211): pid=29835 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14285 res=0 errno=0 [ 2342.648537][ T35] audit: type=1800 audit(1612431806.773:52212): pid=29837 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14299 res=0 errno=0 [ 2342.676221][ T35] audit: type=1800 audit(1612431806.773:52213): pid=29851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2342.756399][ T5] usb 2-1: New USB device found, idVendor=1c73, idProduct=861f, bcdDevice=df.eb [ 2342.769741][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2342.807704][ T5] usb 2-1: Product: syz [ 2342.811893][ T5] usb 2-1: Manufacturer: syz [ 2342.832546][ T5] usb 2-1: SerialNumber: syz [ 2342.843148][ T5] usb 2-1: config 0 descriptor?? [ 2342.896394][ T5] usb 2-1: dvb_usb_v2: found a 'Anysee' in warm state [ 2342.909225][ T5] usb 2-1: dvb_usb_v2: usb_bulk_msg() failed=-22 [ 2342.943634][ T5] dvb_usb_anysee: probe of 2-1:0.0 failed with error -22 [ 2343.098213][ T5] usb 2-1: USB disconnect, device number 23 [ 2343.232046][ T35] audit: type=1800 audit(1612431807.353:52214): pid=29873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14279 res=0 errno=0 [ 2343.294676][ T35] audit: type=1800 audit(1612431807.383:52215): pid=29870 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14275 res=0 errno=0 [ 2343.416500][ T35] audit: type=1800 audit(1612431807.543:52216): pid=29875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14291 res=0 errno=0 [ 2343.874622][ T5] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 2344.134555][ T5] usb 2-1: Using ep0 maxpacket: 16 [ 2344.415028][ T5] usb 2-1: New USB device found, idVendor=1c73, idProduct=861f, bcdDevice=df.eb [ 2344.424641][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2344.432683][ T5] usb 2-1: Product: syz [ 2344.446278][ T5] usb 2-1: Manufacturer: syz [ 2344.453100][ T5] usb 2-1: SerialNumber: syz [ 2344.458498][ T5] usb 2-1: config 0 descriptor?? [ 2344.495967][ T5] usb 2-1: dvb_usb_v2: found a 'Anysee' in warm state [ 2344.502789][ T5] usb 2-1: dvb_usb_v2: usb_bulk_msg() failed=-22 [ 2344.509190][ T5] dvb_usb_anysee: probe of 2-1:0.0 failed with error -22 09:43:28 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e23, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0x7}, @in={0x2, 0x4e24, @rand_addr=0x64010101}, @in6={0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, @in6={0xa, 0x0, 0x8001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}], 0x74) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:28 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fc, 0x4) 09:43:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ca, 0x4) 09:43:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000104, 0x4) 09:43:28 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000001940)={{0x12, 0x1, 0x0, 0x59, 0x4f, 0x9d, 0x10, 0x1c73, 0x861f, 0xdfeb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb7, 0x27, 0xd5}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 09:43:28 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f6, 0x4) [ 2344.704568][T19825] usb 2-1: USB disconnect, device number 24 09:43:28 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e23, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0x7}, @in={0x2, 0x4e24, @rand_addr=0x64010101}, @in6={0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, @in6={0xa, 0x0, 0x8001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}], 0x74) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2345.174444][T19825] usb 2-1: new high-speed USB device number 25 using dummy_hcd 09:43:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2345.416604][ T35] audit: type=1800 audit(1612431809.544:52217): pid=29909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2345.445828][T19825] usb 2-1: Using ep0 maxpacket: 16 [ 2345.469053][ T35] audit: type=1800 audit(1612431809.594:52218): pid=29908 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:43:29 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fd, 0x4) 09:43:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000cb, 0x4) 09:43:29 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2345.528117][ T35] audit: type=1800 audit(1612431809.654:52219): pid=29910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2345.784780][T19825] usb 2-1: New USB device found, idVendor=1c73, idProduct=861f, bcdDevice=df.eb [ 2345.798446][T19825] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2345.822266][T19825] usb 2-1: Product: syz [ 2345.830949][T19825] usb 2-1: Manufacturer: syz [ 2345.840046][T19825] usb 2-1: SerialNumber: syz [ 2345.856889][T19825] usb 2-1: config 0 descriptor?? [ 2345.907012][T19825] usb 2-1: dvb_usb_v2: found a 'Anysee' in warm state [ 2345.914004][T19825] usb 2-1: dvb_usb_v2: usb_bulk_msg() failed=-22 [ 2345.939067][T19825] dvb_usb_anysee: probe of 2-1:0.0 failed with error -22 [ 2346.113595][ T5] usb 2-1: USB disconnect, device number 25 09:43:30 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000001940)={{0x12, 0x1, 0x0, 0x59, 0x4f, 0x9d, 0x10, 0x1c73, 0x861f, 0xdfeb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb7, 0x27, 0xd5}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 09:43:30 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f7, 0x4) 09:43:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000105, 0x4) 09:43:30 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000cc, 0x4) 09:43:30 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fe, 0x4) 09:43:30 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:30 executing program 4: r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:31 executing program 4: r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:31 executing program 4: r0 = socket(0x0, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2346.966811][ T5] usb 2-1: new high-speed USB device number 26 using dummy_hcd 09:43:31 executing program 4: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:31 executing program 4: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2347.225921][ T5] usb 2-1: Using ep0 maxpacket: 16 [ 2347.504213][ T5] usb 2-1: New USB device found, idVendor=1c73, idProduct=861f, bcdDevice=df.eb [ 2347.515606][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2347.534048][ T5] usb 2-1: Product: syz [ 2347.542036][ T5] usb 2-1: Manufacturer: syz [ 2347.549206][ T5] usb 2-1: SerialNumber: syz [ 2347.554827][ T5] usb 2-1: config 0 descriptor?? [ 2347.596242][ T5] usb 2-1: dvb_usb_v2: found a 'Anysee' in warm state [ 2347.603773][ T5] usb 2-1: dvb_usb_v2: usb_bulk_msg() failed=-22 [ 2347.610462][ T5] dvb_usb_anysee: probe of 2-1:0.0 failed with error -22 [ 2347.801558][ T5] usb 2-1: USB disconnect, device number 26 09:43:32 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000001940)={{0x12, 0x1, 0x0, 0x59, 0x4f, 0x9d, 0x10, 0x1c73, 0x861f, 0xdfeb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb7, 0x27, 0xd5}}]}}]}}, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) 09:43:32 executing program 4: r0 = socket(0x10, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000106, 0x4) 09:43:32 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000102, 0x4) 09:43:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000cd, 0x4) 09:43:32 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f8, 0x4) 09:43:32 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:32 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:32 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:32 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2348.634010][T19313] usb 2-1: new high-speed USB device number 27 using dummy_hcd 09:43:32 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:32 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2348.894000][T19313] usb 2-1: Using ep0 maxpacket: 16 [ 2348.919594][ T35] kauditd_printk_skb: 7 callbacks suppressed [ 2348.919605][ T35] audit: type=1800 audit(1612431813.044:52227): pid=30009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2348.988707][ T35] audit: type=1800 audit(1612431813.084:52228): pid=30007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14292 res=0 errno=0 [ 2349.060222][ T35] audit: type=1800 audit(1612431813.184:52229): pid=30008 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2349.144493][ T35] audit: type=1800 audit(1612431813.274:52230): pid=30010 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2349.184724][T19313] usb 2-1: New USB device found, idVendor=1c73, idProduct=861f, bcdDevice=df.eb [ 2349.195020][T19313] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2349.203005][T19313] usb 2-1: Product: syz [ 2349.209088][T19313] usb 2-1: Manufacturer: syz [ 2349.216531][T19313] usb 2-1: SerialNumber: syz [ 2349.226738][T19313] usb 2-1: config 0 descriptor?? [ 2349.285910][T19313] usb 2-1: dvb_usb_v2: found a 'Anysee' in warm state [ 2349.292789][T19313] usb 2-1: dvb_usb_v2: usb_bulk_msg() failed=-22 [ 2349.299311][T19313] dvb_usb_anysee: probe of 2-1:0.0 failed with error -22 [ 2349.493238][T19313] usb 2-1: USB disconnect, device number 27 09:43:34 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000001940)={{0x12, 0x1, 0x0, 0x59, 0x4f, 0x9d, 0x10, 0x1c73, 0x861f, 0xdfeb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb7, 0x27, 0xd5}}]}}]}}, 0x0) 09:43:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000107, 0x4) 09:43:34 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f9, 0x4) 09:43:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ce, 0x4) 09:43:34 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000103, 0x4) 09:43:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2350.353795][T19825] usb 2-1: new high-speed USB device number 28 using dummy_hcd 09:43:34 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2350.603765][T19825] usb 2-1: Using ep0 maxpacket: 16 [ 2350.677030][ T35] audit: type=1800 audit(1612431814.804:52231): pid=30053 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2350.741432][ T35] audit: type=1800 audit(1612431814.834:52232): pid=30051 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14294 res=0 errno=0 [ 2350.788876][ T35] audit: type=1800 audit(1612431814.894:52233): pid=30055 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2350.814033][ T35] audit: type=1800 audit(1612431814.914:52234): pid=30052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2350.963764][T19825] usb 2-1: New USB device found, idVendor=1c73, idProduct=861f, bcdDevice=df.eb [ 2350.973180][T19825] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2350.989420][T19825] usb 2-1: Product: syz [ 2350.993664][T19825] usb 2-1: Manufacturer: syz [ 2351.006080][T19825] usb 2-1: SerialNumber: syz [ 2351.022280][T19825] usb 2-1: config 0 descriptor?? [ 2351.066636][T19825] usb 2-1: dvb_usb_v2: found a 'Anysee' in warm state [ 2351.073441][T19825] usb 2-1: dvb_usb_v2: usb_bulk_msg() failed=-22 [ 2351.093470][T19825] dvb_usb_anysee: probe of 2-1:0.0 failed with error -22 [ 2351.265687][T22656] usb 2-1: USB disconnect, device number 28 09:43:35 executing program 1: 09:43:35 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000cf, 0x4) 09:43:35 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fa, 0x4) 09:43:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000108, 0x4) 09:43:35 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000104, 0x4) 09:43:35 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000", 0xe, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:36 executing program 1: 09:43:36 executing program 1: 09:43:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:36 executing program 1: syz_usb_connect(0x0, 0x0, 0x0, 0x0) 09:43:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b000000000000", 0x10, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2352.406704][ T35] audit: type=1800 audit(1612431816.535:52235): pid=30094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:43:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d0, 0x4) [ 2352.451620][ T35] audit: type=1800 audit(1612431816.575:52236): pid=30093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14288 res=0 errno=0 09:43:36 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fb, 0x4) 09:43:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000109, 0x4) 09:43:36 executing program 1: syz_usb_connect(0x0, 0x0, 0x0, 0x0) 09:43:36 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000105, 0x4) 09:43:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000", 0x11, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d1, 0x4) 09:43:37 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fc, 0x4) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 1: syz_usb_connect(0x0, 0x0, 0x0, 0x0) 09:43:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010a, 0x4) 09:43:37 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000106, 0x4) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0), 0x0, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d2, 0x4) 09:43:37 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2354.083438][ T35] kauditd_printk_skb: 7 callbacks suppressed [ 2354.083493][ T35] audit: type=1800 audit(1612431818.205:52244): pid=30155 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:43:38 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fd, 0x4) 09:43:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, 0x0, 0x0, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:38 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000001940)={{0x12, 0x1, 0x0, 0x59, 0x4f, 0x9d, 0x0, 0x1c73, 0x861f, 0xdfeb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb7, 0x27, 0xd5}}]}}]}}, 0x0) 09:43:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010b, 0x4) 09:43:38 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000107, 0x4) [ 2354.212653][ T35] audit: type=1800 audit(1612431818.335:52245): pid=30164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14255 res=0 errno=0 09:43:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, 0x0, 0x0, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2354.277082][ T35] audit: type=1800 audit(1612431818.365:52246): pid=30162 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:43:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, 0x0, 0x0, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d3, 0x4) 09:43:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2354.414994][ T35] audit: type=1800 audit(1612431818.545:52247): pid=30178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14289 res=0 errno=0 09:43:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2354.593311][T17625] usb 2-1: new high-speed USB device number 29 using dummy_hcd 09:43:38 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {0x0}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2354.815047][T17625] usb 2-1: device descriptor read/64, error 18 [ 2354.992817][ T35] audit: type=1800 audit(1612431819.115:52248): pid=30189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14288 res=0 errno=0 [ 2355.079536][ T35] audit: type=1800 audit(1612431819.205:52249): pid=30205 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14300 res=0 errno=0 [ 2355.103324][T17625] usb 2-1: new high-speed USB device number 30 using dummy_hcd [ 2355.144911][ T35] audit: type=1800 audit(1612431819.275:52250): pid=30197 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14275 res=0 errno=0 09:43:39 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fe, 0x4) 09:43:39 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {0x0}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2355.190427][ T35] audit: type=1800 audit(1612431819.315:52251): pid=30198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14274 res=0 errno=0 [ 2355.333249][T17625] usb 2-1: device descriptor read/64, error 18 [ 2355.466359][T17625] usb usb2-port1: attempt power cycle [ 2355.501636][ T35] audit: type=1800 audit(1612431819.625:52252): pid=30217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14280 res=0 errno=0 [ 2356.183116][T17625] usb 2-1: new high-speed USB device number 31 using dummy_hcd [ 2356.273409][T17625] usb 2-1: Invalid ep0 maxpacket: 0 [ 2356.423161][T17625] usb 2-1: new high-speed USB device number 32 using dummy_hcd [ 2356.513503][T17625] usb 2-1: Invalid ep0 maxpacket: 0 [ 2356.518806][T17625] usb usb2-port1: unable to enumerate USB device 09:43:41 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000001940)={{0x12, 0x1, 0x0, 0x59, 0x4f, 0x9d, 0x0, 0x1c73, 0x861f, 0xdfeb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb7, 0x27, 0xd5}}]}}]}}, 0x0) 09:43:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010c, 0x4) 09:43:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d4, 0x4) 09:43:41 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000102, 0x4) 09:43:41 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000108, 0x4) 09:43:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {0x0}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:41 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {0x0}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2357.792908][T12261] usb 2-1: new high-speed USB device number 33 using dummy_hcd [ 2357.940052][ T35] audit: type=1800 audit(1612431822.065:52253): pid=30231 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2358.003365][T12261] usb 2-1: device descriptor read/64, error 18 [ 2358.312843][T12261] usb 2-1: new high-speed USB device number 34 using dummy_hcd [ 2358.502873][T12261] usb 2-1: device descriptor read/64, error 18 [ 2358.632893][T12261] usb usb2-port1: attempt power cycle [ 2359.362764][T12261] usb 2-1: new high-speed USB device number 35 using dummy_hcd [ 2359.472963][T12261] usb 2-1: Invalid ep0 maxpacket: 0 [ 2359.632729][T12261] usb 2-1: new high-speed USB device number 36 using dummy_hcd [ 2359.762783][T12261] usb 2-1: Invalid ep0 maxpacket: 0 [ 2359.768036][T12261] usb usb2-port1: unable to enumerate USB device 09:43:44 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000001940)={{0x12, 0x1, 0x0, 0x59, 0x4f, 0x9d, 0x0, 0x1c73, 0x861f, 0xdfeb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb7, 0x27, 0xd5}}]}}]}}, 0x0) 09:43:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d5, 0x4) 09:43:44 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000103, 0x4) 09:43:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010d, 0x4) 09:43:44 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000109, 0x4) 09:43:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {0x0}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {0x0}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {0x0}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:44 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2360.792565][T17625] usb 2-1: new high-speed USB device number 37 using dummy_hcd [ 2360.924063][ T35] kauditd_printk_skb: 2 callbacks suppressed [ 2360.924074][ T35] audit: type=1800 audit(1612431825.056:52256): pid=30262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2360.992559][T17625] usb 2-1: device descriptor read/64, error 18 09:43:45 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d6, 0x4) [ 2361.036287][ T35] audit: type=1800 audit(1612431825.166:52257): pid=30264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2361.103987][ T35] audit: type=1800 audit(1612431825.236:52258): pid=30265 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2361.137421][ T35] audit: type=1800 audit(1612431825.256:52259): pid=30263 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14294 res=0 errno=0 [ 2361.272546][T17625] usb 2-1: new high-speed USB device number 38 using dummy_hcd [ 2361.462507][T17625] usb 2-1: device descriptor read/64, error 18 [ 2361.582605][T17625] usb usb2-port1: attempt power cycle [ 2362.292412][T17625] usb 2-1: new high-speed USB device number 39 using dummy_hcd [ 2362.382713][T17625] usb 2-1: Invalid ep0 maxpacket: 0 [ 2362.532374][T17625] usb 2-1: new high-speed USB device number 40 using dummy_hcd [ 2362.622712][T17625] usb 2-1: Invalid ep0 maxpacket: 0 [ 2362.628107][T17625] usb usb2-port1: unable to enumerate USB device 09:43:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010e, 0x4) 09:43:47 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:47 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010a, 0x4) 09:43:47 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000104, 0x4) 09:43:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d7, 0x4) 09:43:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=@newchain={0xec4, 0x64, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8}, @TCA_RATE={0x6, 0x5, {0x5}}, @TCA_CHAIN={0x8, 0xb, 0x80000001}, @filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0xe7c, 0x2, [@TCA_BASIC_ACT={0xd58, 0x3, [@m_sample={0xf0, 0x7, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x3f}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}]}, {0xb4, 0x6, "45ad60af719aea72a07282dc860f7b3b045e2939568b90c5ee0adc9463a3a8d6df573880b7c972b29f924d5bfca015181fd1535ce4cc0224381cbbbb0fc5dd64862fd71c7b820970a0769a8f8f6b25fdb374ca669e91500e0d1d290a8d89f604ac65ff2c466afd2bf771ac7bb0645302ab55f304938eaf5041af65ab9936c395ca7a50356bda957d75a360c93b17e0ecae55240a81724565e70e2962b2cabe1551473b438ce9275f47d038d8288e7f20"}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_csum={0x110, 0xd, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x74, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x7}, 0x4a}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xa3f, 0x7, 0x3, 0xd4c6, 0x10001}, 0x7e}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000001, 0x1000}, 0x48}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x95, 0x10001}, 0x3f}}]}, {0x72, 0x6, "bc2485a9d7144ab309ef422bdf0c66cd439878b12d344b7d9467166b9bc0b43f47b905ec8676c1edcd7e28d339702567ab5efb776ecce7d0849d20203b9339131563ad16324273c73f16b46012321a947710bf2f7ecc22850e4a4e2ea960241717b7dddaf201cd34a1b23965c530"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x5}}}}, @m_gact={0x13c, 0x1d, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x52c, 0x4, 0x7, 0x3}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1ccb, 0x2}}, @TCA_GACT_PROB={0xc}]}, {0xe0, 0x6, "50594057d67d1349f4fdccb4d8893f8227f6c5bcdd6f19ebe0efc98251f011233858bd51ae138631e675dc631c210bdb0510668522a16276c82e6c2c838aae0accffdbbf5a03526ca09e3e5058ce5fbf42713dd71e37ae3fdb74497c42992210b6f9510b7ea3f326ab88217f63afdaeed3e1c4472eb7034446fc5d868d0317f36ecb159e6bf7308947f4b62a42de2e3bda366f5c2ebae63ad0459aa047275ff7a5fa15eb2612f818b7c1042379485dcf41a26b02290e30ef82ee16dda144dfd9e5013ba872c56279995c9e98a4706502d979f7bd250a3a1d7ac2762f"}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}, @m_ipt={0x160, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x90, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x2a, 0x6, {0x1, 'raw\x00', 0x0, 0x3}}, @TCA_IPT_INDEX={0x8}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_TARG={0x2a, 0x6, {0x8, 'raw\x00', 0x1, 0x1ff}}]}, {0xaa, 0x6, "9b69ea6da5495f560e4a4cb050539ff9f6dbe2d5b61735c7fe86140f710e3a8875783ff9e3b795965e88b229a8600f2d828e384b0b6c0edf87c6cb51ab872eebc7e0fe072f85ad1260277b358f8c800b82163ee9a065431518941efa9212c554943ba12cf8c410b1ec190939adc458e5e01284411007c3fe4a34cb283131c132a2e935a0962a98a5ff8db46429e8e7b92561a96296775dc05b4543c9e0938d630c3dc37e6489"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}, @m_police={0x8b8, 0x1c, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x88c, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x8, 0x0, {0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x6, 0x0, 0x0, 0x200}, 0x0, 0x1f}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x4, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x3, 0xffffffff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0x5, 0x0, 0x0, 0xe58abd2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x100, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x9, 0xfffffff9, 0x0, 0x0, 0xfffffff8, 0x401, 0x80000001, 0x7, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x401, 0x0, 0x3, 0x0, 0xa56, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xef, 0xaec, 0x1000, 0x0, 0x3, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x7, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xffffffff, 0x0, 0x2, 0x7, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x11000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000, 0x0, 0x100, 0x0, 0x3, 0x2, 0x0, 0x10001, 0x0, 0x0, 0xaae, 0x7fff, 0x0, 0x0, 0x2, 0x7fff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x90f, 0x0, 0x4, 0x5, 0x0, 0x0, 0x5, 0x0, 0xfffffff9, 0x3, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10000, 0xffffffff, 0x401, 0x15c7, 0x1f, 0x7f, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x0, 0x941, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x200, 0x0, 0x0, 0x0, 0x322, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x870d, 0x0, 0x40, 0x6, 0x6, 0x0, 0x0, 0x5, 0x0, 0x7ff, 0x0, 0x0, 0x7]}, @TCA_POLICE_RESULT={0x8}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x6, 0xb4, 0x3, 0x0, {0x0, 0x0, 0x8, 0x40, 0x0, 0xda29}, {0x3, 0x1}, 0x0, 0x0, 0x80}}], [@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffa, 0x0, 0x0, 0x9, 0x0, 0xd161, 0x3, 0x0, 0x9, 0x100, 0x0, 0x0, 0x8001, 0x3, 0x0, 0x6, 0x2, 0x80000000, 0x4ab9, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6, 0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xbb5237a, 0x7fffffff, 0x6, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x24a, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x10001, 0x0, 0x0, 0x0, 0x0, 0xbc, 0x9, 0x0, 0x0, 0xebcb, 0x1, 0x0, 0x0, 0x5, 0x7fffffff, 0x0, 0x40, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x3, 0xffff, 0x10000, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10001, 0x9, 0x3, 0x0, 0x9, 0x200, 0x81, 0x0, 0x0, 0x1000, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xdea, 0x80ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x34b9, 0x0, 0x6, 0x0, 0x8, 0x1000, 0x65, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8670, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x431, 0x0, 0x81, 0x6, 0x4, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0xe6, 0xffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x10000, 0x80000001, 0xbb, 0x0, 0x0, 0x2, 0xa78d, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x717, 0x4, 0x0, 0x0, 0x3, 0x100]}]]}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0xb}}, @TCA_BASIC_POLICE={0x4c, 0x4, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xfffffffffffffffb}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x0, 0x0, 0x0, 0x0, {0xe9, 0x1, 0x6, 0xf5c4, 0x9, 0x8001}, {0x2, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x7, 0x200}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x6, 0xffe0}}, @TCA_BASIC_ACT={0xc4, 0x3, [@m_tunnel_key={0x84, 0x4, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x2, 0x807, 0x10000000, 0x0, 0x3}, 0x2}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @dev}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_police={0x3c, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x10, 0x2, 0x0, 0x1, [[], [], [@TCA_POLICE_RATE64={0xc}]]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) 09:43:47 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:47 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mmap$fb(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x80013, r0, 0x0) 09:43:47 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:47 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) 09:43:47 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000000)=0x3, 0x4) [ 2364.029138][ T35] audit: type=1800 audit(1612431828.156:52260): pid=30302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2364.076135][ T35] audit: type=1800 audit(1612431828.196:52261): pid=30299 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14283 res=0 errno=0 09:43:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010f, 0x4) 09:43:48 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {0x0}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:48 executing program 1: socket$inet(0x2, 0xa, 0x80000001) 09:43:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d8, 0x4) 09:43:48 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010b, 0x4) 09:43:48 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000105, 0x4) [ 2364.120803][ T35] audit: type=1800 audit(1612431828.206:52262): pid=30300 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:43:48 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000024c0)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a2, 0x0, 0x0) 09:43:48 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2364.203010][ T35] audit: type=1800 audit(1612431828.236:52263): pid=30301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:43:48 executing program 1: socketpair(0x1, 0x0, 0x7, &(0x7f00000024c0)) 09:43:48 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:48 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x0, @broadcast}}) [ 2364.786066][ T35] audit: type=1800 audit(1612431828.916:52264): pid=30327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14289 res=0 errno=0 09:43:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000110, 0x4) 09:43:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:49 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x41007701, 0x7fffffffefff) 09:43:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d9, 0x4) [ 2364.887687][ T35] audit: type=1800 audit(1612431829.016:52265): pid=30339 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14255 res=0 errno=0 09:43:49 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010c, 0x4) 09:43:49 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000106, 0x4) 09:43:49 executing program 1: pipe2(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read$usbfs(r0, 0x0, 0x0) 09:43:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xb, 0x0, 0x0, 0xfe0}, 0x40) 09:43:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000d40)=@newlinkprop={0x20, 0x66, 0x1}, 0x20}}, 0x0) 09:43:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000111, 0x4) 09:43:49 executing program 1: perf_event_open(&(0x7f0000006480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x2, 0x0, 0x0, 0x5a6c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f00000021c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401070c9, &(0x7f00000020c0)) syz_mount_image$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={0x90, 0x0, 0x0, {0x3}}, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, 0x0) 09:43:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000da, 0x4) 09:43:49 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010d, 0x4) 09:43:49 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000107, 0x4) 09:43:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:49 executing program 1: pipe2(0x0, 0x8c800) 09:43:49 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61108c000000000061134c0000000000bf300000000000002500020007ffffffbd0301000000000095002000000000006916000000000000bf6700000000000017060000b964b01a4606feff00200000540600000ee60000bf150000000000000f5700000000000007070000020000002c030000000000001f75000000000000bf54000000000000070000000400f9ffad430100000000007c000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27df8ecf264e0f84f9f17d3c30e3c7bdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703d6c4f633a9a4f16d0a3e127bee45a000fe9de56c9d8a814261bdb94a05000000c6c60bef0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cac3f1d5af65727546e7c955ccefa1f6ab689fde4de4e63ede202fa4e0a2127b8b83c71a51445dc8da39e5b0ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfecc8158f0200000000c8fb735fd552bdc268694aeb0743e326c819b6cf5c8ac86f8a297dff0445a13d0045fb3cda32a673a6bb55d8c85f21dce431e56723888fb126a163f16fb2ad9bc1172b84b3ebe174aba210d7391b2d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb400001e3738270b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6f35154bcb4000000000000000000000000000000bc3af2b170ad3e2b268f4ddc211bc3ccf0bd9d42ca019dd5d022cf74686e9fbe2562979eaed840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa1769080584f8a953c98a98c797868900031e03a651bb96589a7eab04871bc47287cd31cc43ea0ffb567b40407d000000000000000000000000005f37d83f84e98a523d80bd56a57fa82b82f639601ae899a53f6715a0a62a29ab028acfc1cb26a0f6a5480255d638a0c544ba0dc828c22fe30000008000000000000072c60000000000437d57fcf8295f63a70837f5cd4ee94d180822dc7ca3aa3476b7f2d851d27fd4de6eabb43e0799dc8d9fb7dc6c523ffbd74a6a40e4acb1ac493a27051f2ab759b8dbe843aeeda0426c7e7c0032028c95b29b6ddb55117669d9598c0f3598073f3a921c76beceff7e4fbfea5011af0a99fa077ffe70cac8b9e44023a1749eb1d0d572b77d6e0d1eb6eb4e1c8ef2629f5ecff4626746d6abe98a255e92c3c4f79bfcd0d91741380000cfeb73dec68ed56b5d3dfdf0cb8b71ad79000000000000000000000000000000dd434a25e95d0ec29d3adaccf89d0888031ecdfdb4dfbe444673be099ece7e4009c76c716d906fbc3c9b412e0478cfee4485f423c63f49db43833c92eeeb647eebd4d7a93a17bcbb6bae5ff876375d4f18ca372104772a3a35ecedd97fc191d8f64d2b1d60c6d12911aada66c26aa4802c3514c3d92ec9f9f3262cb13f4a2575fbe943a6c400000000000000000000f3ff0000000026b80c3899543223a6079ee96198b9a326db3be3248af415ca28ca68c502550045ed8e29af8d763ef9b1f31befcad2ce537e74ccaf7ad3aa268cccd994601c7cdc233ba3d4ce26ed703dcbb3ad650f7fe339768924f6dbeead13b88371154d743544a6091ec93e0d3fd5b4dc42911c1ba322fd4946bf19e617d51f964727bfd5cc5ba15370913c455ee7263778284939d070ec44ee6ddccb83757dc9b3566165fbfc988b9348ba7eb4dc7481556f5ae7936c014fd30bf89169bc2ef46c6646758a37f6ab92e88ef355a610dec7ac752bc1b8648a587f660c8f6037649112b6bc8a363825bf82f2a83befef4d97327eb8e9a7df1d49ed31666e2611ec10c4863668f7494ac3c5817b74000000000000886f41b9f1368876597ab27c8793f89f73e9f53bf99c46d445b85e9b9bf4b65ea292b001000100000000006499010001004ecc291f437b2ad288bc536f1c059a33a3108e01b3be677e302f891a4ea6e10701e221398f5f4d16da7c3aebbf62f35c583fc7e2fce132916f853fc1d0b841e82d96441c3f971a34584a4d17e358e3fc0e3ad3c07c5077d9239d86ff1032f1cdf4f1d0a144819e1f286e0f3403c6fb355b48a7d593ba096b05384e663024c44c43960a005accfd62144c12cf690d28b87772a4c4d3ca14fa90294785becfff381e259f4335ddce000000000000f76f09c46f30ab747914db38a3948a904fe0c30edbbd162f5e3b80086ebd99bcfe2eead50e5754b80f3b4d9be113a4b147cf0387f3179306048204673eafa02705b2c0b8d4905f05808183da1c1b5805dc11f1240a2f6f8e85dd28bdb43742a39ec84aa6bbc8a13fbd206d97702fa21f6a9b3b9dfaff8563358ba7fef84e34a90d3d3a7168fb55488c2f055c47fa3bdf7077cc4a9735c08359fcc233ba649c6a51296a826406c431b4b437db90abbc35c1b91b2ef681a0a1e1bec9764e"], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 09:43:50 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:50 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {0x0}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2366.475368][ T35] kauditd_printk_skb: 6 callbacks suppressed [ 2366.475379][ T35] audit: type=1800 audit(1612431830.606:52272): pid=30399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14288 res=0 errno=0 09:43:50 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0xd8b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) 09:43:50 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000db, 0x4) 09:43:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000112, 0x4) [ 2366.523165][ T35] audit: type=1800 audit(1612431830.656:52273): pid=30403 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14293 res=0 errno=0 [ 2366.594703][ T35] audit: type=1800 audit(1612431830.686:52274): pid=30402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14292 res=0 errno=0 09:43:50 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010e, 0x4) 09:43:50 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000108, 0x4) 09:43:50 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)=@ipv6_getnetconf={0x14, 0x1e, 0x1}, 0x14}}, 0x0) 09:43:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000040)={'ipvlan1\x00'}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) [ 2366.684363][ T35] audit: type=1800 audit(1612431830.786:52275): pid=30412 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14279 res=0 errno=0 09:43:50 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='macsec0\x00'}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @phonet={0x23, 0x0, 0x80}, @isdn={0x22, 0x2, 0x5, 0x4, 0x6}, @ipx={0x4, 0x1, 0x6, "b51c79e897f9", 0x9}, 0x101, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='veth0_to_bond\x00', 0x5, 0x5, 0x6}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000001f80)={&(0x7f0000001ec0), 0xc, &(0x7f0000001f40)={0x0}}, 0x44001) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000001f80)={&(0x7f0000001ec0), 0xc, &(0x7f0000001f40)={0x0}}, 0x44001) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) accept(r0, 0x0, &(0x7f0000000240)) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f0000001f80)={&(0x7f0000001ec0), 0xc, &(0x7f0000001f40)={0x0}}, 0x44001) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getqdisc={0x24, 0x26, 0x100, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x2, 0x6}, {0xfff3, 0x8}, {0xfff3, 0xd}}}, 0x24}, 0x1, 0x0, 0x0, 0x60044050}, 0x8c0c1) 09:43:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:51 executing program 1: perf_event_open(&(0x7f0000006480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x2, 0x0, 0x0, 0x5a6c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f00000021c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={0x90, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x800}}}, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401070c9, &(0x7f00000020c0)) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={0x90, 0x0, 0x0, {0x3, 0x0, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0}) 09:43:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) [ 2367.050184][T30454] sd 0:0:1:0: PR command failed: 134217730 [ 2367.058798][T30454] sd 0:0:1:0: Sense Key : Illegal Request [current] [ 2367.076264][T30454] sd 0:0:1:0: Add. Sense: Invalid command operation code 09:43:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000dc, 0x4) [ 2367.270166][ T35] audit: type=1800 audit(1612431831.396:52276): pid=30426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14273 res=0 errno=0 09:43:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000113, 0x4) [ 2367.368197][ T35] audit: type=1800 audit(1612431831.496:52277): pid=30436 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2367.580977][ T35] audit: type=1800 audit(1612431831.706:52278): pid=30437 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14275 res=0 errno=0 09:43:51 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010f, 0x4) 09:43:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {0x0}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r0, 0x1, 0x1f, 0x0, &(0x7f0000000080)) 09:43:51 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000109, 0x4) [ 2367.707309][ T35] audit: type=1800 audit(1612431831.836:52279): pid=30447 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:43:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000dd, 0x4) 09:43:51 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a2, 0x0, 0x0) [ 2367.768319][ T35] audit: type=1800 audit(1612431831.886:52280): pid=30469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14283 res=0 errno=0 09:43:51 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:52 executing program 1: sendmsg$sock(0xffffffffffffffff, 0x0, 0xf75b5bffe87683dd) 09:43:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:52 executing program 1: perf_event_open(&(0x7f0000006480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x2, 0x0, 0x0, 0x5a6c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, 0x0, &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f00000021c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="9eda438838743bd4e9720bee57093515dc189a5ea685e9556c1c2c3cfc4df50d66d31a48aa312663b68d18c5826b5b55fb738208863dac0f10f423aee7a5d8ddc45ebdfeb7424bae859d7c37ecfc4b63914d5a56d91017dd22bc84f759a15969951aef9d5c88c96560896988fa18cd946cfcc3a0f1c993348377904eac32c980bdf7976ebca2b499cab63c4e841514277fc71d4620e29a92523402485de0e82896484c0ae497a4d686df23ca7b68c3fd5e624d3510d7f94838e54af877ca58a00c5a672bba11f5aa1ed1980dfef47b9973d0bf456ded5e72f1702b3dc5197fce39cba53a038d8dc0ec783ce70577107dc5e8b299e64a0b7f1191f0926bd25762370191710bab2f44e9069f55f8a3f87e4cb488a2fb3348c0bf3b3874291f83e4776b160ea73aafa3919c7c069c73c0052173a63158db8b65541d161f9c964926ad7f06bdd6cb6a32135b04e35701c2e13c49c1f75dc7a25d623378860692d172ec3f1e1f2d9dc77c015c13721efcb101c2390abb847e871132f472a37cc0163b39b1d575a5444e246a08a1afb1a696cabab29498a314429a3b9f44c43ba29f71fac1fbe0d01c3c16d22730932704bcfb0c1b7a432bc51dd3f5dd5afc3b342cbe6a6ff899039e28f9a51881b1d46fdcf31767cb6f5c5c69ab3c80615d77c4d1664fc4ec831b8cea2e752bbb7a9ce79df875b29f1e232751daf32a1a0c4ff8bd0688e2b8e2d668b8a77e20a9eb6ec2e2c23b94e507baeacbcfa31fb6e1ca3343668f43e3aa6d85e7c29bf0bb4dbdabddc92be7f4a6f5d21b19e6da17bfb6cc926e3847532fae29c7b62fb909130ec372d3c16cfe6aaf3ce2af0fe7610fde7aad61bc80d2f96b999c8ccf6d22cf903ca8ae8b879ec4a416f334982e9810c0140a18d4dc81b5edaae23e9f4abaf40ed71512aebbba5bb251545e188db789558a845a2877b14bdaeec3c738b7d730c0860531bf5517d4f0e8f95ed3571f8a35816d5116fcb8d7cbf42b7d5d5e65541508c898bb2e0fe96297d2ab7135662de39df099ebaed5871111f5346278cee5728cec512e6c0a0d65b51e3d627873195b84103341c2bc83b6c8fdd8ba17f5957413f61c69d618c9b9d0b1f08dc81921b6c662ee1da3bfa019b095e9a03c2db4d645ccb7364e895098cbf7d932c72d80663c7a1694d122f7348393079223c11d36c64a5856eae0397ab9a9d948204b74e56525a9d552dd0916de81cbb5af3c59b3d7f8f9154423ce2cb45a5bc808e24bef13212019a19545fe54ba84d01534358380192b8c7b0eda907810375bb66a578a58fec392b47991271c8367b91d710e8a176bc1a4e96f0e137d4c25fbb03eddc392f9f170dd744472b864fbbae7c93d86e682308b21b73c5652065d72cf02e1152b44024a90a3b52eb0bb3cb412e518d37a68aa4c7f46789c54ab30d3a73d0a8712fde612294cda2aa1ccf164930b9b1d17801d4fbb06e849d39bf2b5141330caa0d2618b616f1c67e1ca57080e79ed9092ba7a55e8121cfc825cd26a0199a479a7ab1b7b23d2a4dd82fa6d04ee41ca680435efc934f0451e865e8632ac2f1115f4cdd33b0fccb7a2326127faf20cba37c828613dba5a98f4e1ad25eb6b91078cf73d873df9ef91531476f64b83559ff7ccdc4c070d478b18196ea05fe8d4ea0216ee5273dfabbd04582f40f064c9781afd2cbf30901f28cd09cc934f1b2d50883778274177e3dba8af0a1b931d80ce1a6c4085780ea2195b65ecfd2953f78a5290fe560d0cd6a5e73890a5a82dc410b92a3ef2be05ec5607820fd4ca6b9c3aa258d59022fdcb21665f1ce4e8aad8fd918c43bd3c2afe3dc223ff9f48831d401c8b6996190793d1dd7551f8511b69283992398d8f9b4bd2b3398d3b8c6f3c5d8b802ca5282b70242df2b7be4b38e70c3065f8da888631375afcc05ce578089c4f783776b286b7a60d1b5e189e2742a3240c1036a953d886885422eef01413c38099b64505fd5a73488acb4e611820674c58ae74d6c64a885d4beda9bd7903bcdc71e3711e2a057c0eab2100c321050ab14c6e453c53182577ad3178603cd9afde40a701120e9a36074fd582428c74e02781318e6c65450f8f020bd22475696fe13b8c59260e53a06d16eabd135e887a0a6bbc8ad21be7661df76fec5b13844f68b8eed1a7379713738beac9f23c7a26520e19797a910cde9fb285179526889b908b7eb49bb06f70f6271fba8712c1a4269ebcf4b7d043e924e3d2c4c753fd7e547d95841e335179836f76424e728810d7f32b78256ea30c79d9238a6588426e1f2d4c0b03d5605bd826ed24f0f11326b4cf958632b86e017aa80e142db1580c44f76d9c98196f3f6852ab2bfc6a01a3553a130c2d171957f5a45c3550fbbc990ef8742a98a86b280a57b9f198ff436bc01161ada50e6f23026c3254adf2321bff7e20aa54080bbb57d8d52c6a6df6107706a2e5bc6da68f17b474c0edd39401d765086e885cf7992405f856557915603cbe8894676e996bbadbb649a5e7498b91f9bd2f697dd9ebbe4d386050258b9f4c94781e61c660651c3f1e3ae51f8c035eca365bf15d6db48ea9ce183515f4a208d010f7c23dcacbd6e225490d7e9c133525f5c9018d752b21b4897bf18b64b6a9936f538a0a8958fc934440aeeaad2b68ac844d76f0900a6c95bd0b353d85d4fb62eb88360112237fd8c636a80e3130b21d66ae8ec58a4b76cba0602f96da919f7e84fd37e3ec2379f58e389a39c78d2482e03c379e3c4649ad63a76e3707ecff07d2fcb0c9dfc524cab49e69a09c92e4f88714335cb57d3f6184d07bef9657280fb5c9fd2d8f940f7ac6c5407e3077aa2e4ba8e217e0ee19e302d6d90e3be05a86dade35d2e454e511afb5cf5936f1d11f2fa6be6ceaa817dbdc7a6aabf2fad8ff3efa8382a25099f0c5989d2ad56ae0f4968b2cfcfc67b4f1c161c75900b4848f59a3c0376dfcb7997bf28e9e85d6dd942a360516de38e1c1a038a796f9a77ff2b0c7e5e8f4932391a0e58e76dacc6f9764178a211dfde3e75d367d2911ff398126ffdf83cf2fbdf1ad5232bed9155f7a168638a572094a9e934d4969b358cf6e121d7fd2aeae2f499068b42c152f0e3403a230885d6f92f038ddaa23499f804ffb06abdbabb51f6c38c92fb1a6271a4b13d6d11125b8ec12efa5907dc65062797fb9cca15e2f254e76b182d3fcdb4e96ac4de36d6df7e7bba5c32f422286b1be3b79bffb6fd693761952d195a84ad9ceb07287a0fbefab9e0347b513c5f60233ccd4b52d90ec144a2f896d9dc7f279f8aa93038f3efa286e1c3006933a4d7183d952f8d28b141b28b2af355b5bd8198dfde1ffb8d09202aff0d16ca3fec194662892a49f829813970a4520f1228aa03d211a45bed3b2e05bf1f10b1a152761e7b6c6ddea863a3c02224256092c70ca70dc185c4c385dd98b09e2682661e1e66f71d9c4037048eb70e8a1cbe57de87ec43713abf5fdcf63b9c482f318e3bec37e878dadbae15a02d731e6c8574eb14c059d72f73be5174add786d06b585a28a06d349d8e434a491b34897b3c1ad786ec8280d7f57edd4fbc6aea5485d659b59d393e331cf91e6ed76f340fcf7cf460892fa7318fc42b883f61d888ad982a751accb613c66661fba5f3d6de751a6a9ef8a4700316aaad04e991aab7903f4ef012ec2a8c092234e74ef335daf360ae47bbd2bbc6ad8c1a4f81efe8bbd703cb55ef36b32b4e30cb5a3b165c02ba295d0e1c40ce6ff8f479a74f01275f113ebfa8ade37a59ce70e6ca2a6f48f1be085f61bf772e2c2da523a2cfe63e99c57bdb1ff23139d4fca49eff7547e9880eefd3f7511a677efa23b52098ba89037c48dfcda2e8c1cfb9f892161049e53f8cee55256279512aecab8c441600dae0fd957883273047cf5c66ba209f830aa2ce0cbe41ca08c0cef4aed7f4324009200661a7ce680e5a8df2d051c1d8b2f63d25d8d74d05c75c46c8f3f24d625539e63459650960498a54ec3b16225bbbf4d3930009df265839d72611f5332a904cdebada108236e4414a2909ad01ec44b9d7f75de4385ad7ca5152e890a0919b3639fd1bcbca3b737ebb8d9ae541b1271cf2166ba15830e66f3d3afd3b754a7f81ad4f0999704ae99c114907c5be4a4797f13b80564f234723a34dbe137dabfd7fa23562df679f54a6ab54def6d63deae9844f72fd73efd0413551f5c4b9ee826eb3b7faf92a59ea34a16723b4fea14d1c8815a4e2d39fc48d1dbce526a7c53f5a96d0ef6463a0cee73fd3505f5c764a264b83c4a21f80e8b61c82d24442d13da99d18dc1b2538e7a510f6093d9ef2bc5cc777d4f98411e93919eddfd69d6e20d227cb61c50f358ea227f4de941fb080c1cf6b1f6e25533768fe133dbfc3f9d29c603bed38aa3c5af5b81a706b0067b40b88f992610d04c7cc36b8f649697cd6a93fae51138161891ae75a7147780fc59af5a6e18c54f9d2a4fe7fa92314b399afba9a40d0cc24f70a2593acf8d179215e06b7a9a88224bafcb2cbf60caf5fe4ff38208a70793b5dc33cd572956260e1c86312d3ba9b3a4b2b44376f2e78c616a6c0880ac8dcbaa30b9f761d500fd03a8518dd0509157b184a2d95e0caf3ffc8ac2db6c54d80c71a1e5b9ea3bf51071e2118af204123daceeb04e4f6f31f32a4d3fbb76ee49440cabda2c121c1b99acab5b87cecc37c3f9066af34ab29d6598bbfd91047a2ac7ce3a8f3027ff5e6d743506f161087278896a98ed37122ba208b61cf54d3929555ab06b564cd5e4f46f4755a6cfa2ef2b30d29ea66f2749d4060d411fa9160c91b6f55cf071ac8222c6313df18759e2958cddfe3db4cbeb9cd39abcf5f0beaecae8437813995cb7ed0b87d42ca942ff7245ece204798d01361c5f008e0d82bdf76660515bc78f7f8f409ccf68614b2cb50f5af2615661326fd971bc57eeeade60ea906b8df1cb0dfafd318cd2c396309c329d0469ca192aa8f51d7c4227685440f073983255baf054b97b9d7be1d1470d7eabd5c09b2116b4e86b0567b7e97e088717a4fe3dbdd310a1c39136ea4d2c47492001f9885dba03bf97e7da376171d666441cdc2f999db137603d57df32b4260fa0165e82917bb1631ea314e7a7437e66fc68cef22cda8f456d6e583f6e3237e0bc79987a9103f7cf0918e26881f67ea582e1ff3a49177599d385bf6e42572a2547933aeddb826530e9adf30dd84c3a7fae5c4c26f6c6f3a9f0906decd314e2407825abef959c5416d18a92ff34e6c521a16e8a0a29937c77d4ee99b41d530a732acbe0bf5d274df9d496b47a9a624546bdcf9976cde12ec989cb2a70b33a7c8a3a77652023164695f9db30dfcf587f0cd4f73e385730bcbdd688f6dcb08ba0efbb9f579220afefa4acfea522e864fce9b1782ce9f14824d16e9d33a2609c23ba3c5a1af02549357a0dcc12e37819d778021762cf895abeac1125b744c8b8225a091e7be9ded9993cfa3ca9abb83e25c8f559009977a2ed9374a89619fae5ef6d164bb73d242004dc8428e44689b33ee3bbe88bb4962ab0a32a90e7aea044f08410752cb2d7aeaf3196648a3a99092665b478bb394b48f79b36db0efc7f50d6a5179c945f5298cfaac5e5dea715296f92abce7281d48a0c9c6b785a35ef5f1697c047ddb254fe9a8ab9f498b0c1ae09ffd01a3d8d427fee7e36c51e0e5c2fee2245fb8464626ab5c9857ebce91f7d22bf024d10c2df1021cd69268472de419e6cefd970cc3a8e4d1bbe6496799aa7f100411766e712aff08b731460f14f9d7356db12cf8e1c6121968dc68b1d81c086b325ca4ce6fe1f476707e08fa913144b757c6be17cf93150db29544d207f09a896f33b7335d9339215da751e7af2c6bdd19db6f521af2c8a5998dc607f97026d07111488741134c1c86eba123273d1fd5ee4b471e86f9ae9478a04c7482076ab34a1eca5c64f89e5106eed44bceec019c67c12fb4db4fdac153f4ac3b63ffeb6d30de58ec039e2dd3c181e254cd94d0a2b0b44490384cc5915b54ee1db2b6d059879bf8126c9ca976d0f7862da07ecd350930a081810a7afd72b2ad3f65b96ae9c7f91227a2b5513a559f36b90fe01be9ae5ad3ca65e2c26f358fc26b858a3633fda7ae49a5fb705220a5819b3cca41b1ccc21d7c40f5fa9c422288efa5394e4312675899d704a2aab62b8363f58fd4bc12a8bea6ffc45b4414237bf5f019321206dbba439acb5ef26641f30fdac20f964354bce94e4c9d73e137f9806deefaf6f4acaa0e76ad4fef9f6cb7fc01bbabda9612c05adbe46afcf94819e8a4b4b49ff764784fa432d47fb6d4230900043d1b4521cd6839fe8c5df4d1899fdfb13880e207cac73f0a29020bdd563bd9c2f6bcd1ec523b3e03ebf6164fc65af001830c51396f9df2d346f83a59cfc82201cf1150ea57259d579fc2ed199b3fbe42d5188c84e4354610743e5b23a265246313cc63913f17412fa00d98b379b80b96d936969572e11316bc8926cb23115186f3b2387b82c3898fa41bf16a308da62d5a3eb3609af1943fddde08a4036eb2a41b7292caad9eb082614b02a1fa255bc7abd4d0e3b4ec1801e131e68c7aa9da1a0ff10f9de87dec8fad1ad8bfa99caa49e203a7b9c33e044d4544a537471e7a452468b821959bc488c6b8cbf81e90081a26de273ad1203cc06adb6af242ab19f96c1c66b58c37e2c9309704fba63af99a8d9c5efc651afb631fe9f546b938cc3b8e526c4159e5c9f7afb29fd1d55fabf09367ce2a63a35e7a2062d1c772ed981fd77157a847f687a177cf9886ce41df8cc509302b46bc1e2ba896b1c1656a1bbfdf4cd9ac39cf8510d1c823075f16550fd044aacc8d42a56f03718f7b18475cdc3999faeb25ab3dd8a807ee04d8e5d831d08b4e309dff50330685138797e10c6362636f53f22bfc1f3d5090a5d369282d9de36bb4e2505411ccc6ea395afa1567b15a2fb4be2adeea7126b1a8e80034105e0d98bdd78e796ce1cdc06a4ae666fc0baec5c52614340ed997673e26ec47c88846c000bb7c9077337cd44f5c041fdcc64986e5e1c0f488148f0ee6f842c44c0b72e82109270341bba6e9080b70fcf930d0f10be5a36798e70111fed72727b72282ff164fc08319d74f1f57cde71b57cb397a9e753f87b97729bafba017a24cbfdee5dfe7fc296c112e93bb8fce560ca80a3afd8370baaa79ad783b51352b5440b144a47378c9ae22eda5794328e95bcca220fd07bb56915529b155c61858efe89ad36a79288e74c0e251addcfaf797432175a5562b46eff5e3aebeb74623e18beef85389383c604d8884431b07dc4bea0174aadc337ff41f558a63f16690feae47efa2a5d1318b7397e1e4ba398727d286791b71610e1d78d32800e7e113c12abf0f60b6ca4401ecd23b7aacd990633b2b017daf6bfef1b2361ece74b7dbcbb1a73d4bc1f9d2e5c9fb0b7980d25cc44d1b10c09ef5a6a05c84669294a5cadf0cd88ab449f9f0bcdd8c48590d416c5c1feaa494a2145949c2a3373df7c6014225f2745bbeb20ff294d22c0d96ca111e6926946207cab56a03162a49e68968e398f70690188ee3ca847ef421742d60b9a6ad029e8a3d607950b2bf8ad8ff297cb39acc94905635770436e134435e28205140331b5100d9f64469792fffac87bca0835cbc617446ff86a7b50418c305f32e658b32130e491e38709fd3697017ac8084cdf1ed81a28375aed092ab4e32ca88a933154dd3a9e99351acbada926b67b310c7070ac1a414a28c5abfe1f45476249a12f18ca2d981528d881ed3c5072e46a6eff3cdf37dcbc89c7f79c88a1f8d15d15beb66a0e4440c7b93e379c4e2bac1d5c8e85f1852887e2cfeb178fba1c67dc2adb0c87df8ca4444ca7f455509f492effb5001328b8cc696e2933207a2d78bbce8562ca34a248193c914406b161c8141479d891b0c6110ec1e25cad38299b489f2ec437017cadba67dcb58abd4933c95b3526f1d4747b8701a7d71e446e4b62e2941d4281faca0cf22914be5aad80f47100000000ceb24e82508fe55a92fb6db70d03d1c1ec09cfee31639341756a4630a0eaaecac7bfbddf9d30c42cbd45eb181d5bd341307ad26f496bb042e2b655c03ac3dcc587acbf50f79b5c239be9938b62d3251b199f8413b020605d5d0552cfd9c39c9132719d6d0a326b000e12fcb51bc274df79d11430060d05978cdd50583f1bca82c57dbee605e2d00fcb5414af13a596d35cb5ba62de6a28cbccc857d23547b1c7fd5ac8fbf6758d5b8451fa46d9acc00344dc2e565674b1dd3547eb8f8aa5fff99042f8d1d59e6ad2f53379211e6832fcb68f5777eb2db85b28f724f4e4ce6342cf55713ff7b0cb4f7f47dd12a6566b86709eaefae024373267ce72a89e7f3e42ab48edcccc96b5d0403fe93a927e5ccf470014f220b8257393226cd7b996f20e6a34f81206733a9fdce03b701943c1b560d3eab68c2c225cf7f7f2b56123be2bb173e9e5b37f4d3348f6b987764ad07c2acd44514ff264d7eda31e5e517a179414841ad4553d51c08f435e05f10aa82d74b97a9ba3a133e6c9175fdcd4f3dc9c16d3be1d5bbaf13240177081ac1d56681bfa988a93af09868afd608520c0bfd71d857a6661fdaf6f2e166987eb007449dd26334ae932c5003fefc0f983b9e49cbfcea325f2de16a9ae935caa46f5b3433957fb370971ed957f138f08a60fed5b84995e428e7ae7d5c22021ff016baef0e713a118344c016a99ad469313ba7f2452da0dd82e019f64aa229cf80a69b3e08ac5847f10d247179855546313232f23e055c2f74ecef14e0fdcc29a9bf0976fbb249bd5c7903183d2a53c70960a183630e7d4928daa7091a85ad987d2a4a5b8f6be6612fa72d9fbb33c67bb38eff19f2e784f94e0354cf6d35a5b2c62233c039de3734b38e97ec72bd673fef09fd56fec329818cc68cdf12cb52f7d37a8350c16e94208880bfcd3e895d7aa4489e3dd15db4a9026f0d2a46f1e89c35845dbd976a1992b87c15a0c7580e6424b8792a7bb7b933d7c5433d4133ba4dbbcf7995d6ed3feaa32f876a287feeb9cc6107778c1f83e0119d980b9e994c2a3ae3de24a103efb3cacb746b49d1ad85746b233ab4aaf0e988ec2a786bc93f32040d3bdc3008031634cdfded5ac95b2279e096243228296591e7ba53c4a127772cc4620e6b238ccad250629194533d0a669ff3366c52d64928693e0b0cbb0b8e2c6029089d4dfe2b4b6c5dcd85f1a02770611e65001e48a32a8b0431a3b9d77fa3a95be38a0436a704c05a8e0183f3214c25531a63796f679bf72885aa766468d42b2543542d7e82544efc5c5e81e6a91a0f5d4e68000cff687d63e45c9a11d4ef515050daa592c9a828ac7c0488e7cdb3d6fdaef5e9176ee68d981ea50d386d74df3b40660351736deb03bfceb721878cf9894b0302df15964242ab6b9f77f98ba1c7993735983d2b022600ab74a19e3636e1400d08ba45d3a5c2774cb06a1c358bbfc11d27efaf7ca53c2e7757c8c76da24707d91a4a5244262898d68083ff91c514d9b9b1ebaa0cb0b10254fda1b1e82b9a1a47f117b5b280ddbec1f6732d11117ef1a7a674699df87fe795d1243cb9c4527e364e2b711b6562a87fafc130ce0baf1701686639b05f0c8dc708f008b1e6ab89e8d623bb83f3d54b7bcdbdacd055ac4eccbd36bbe0af0f65a00e3d6dd985ae8851d176976cfb5816d1fc2a63d3546aecaa4e712ca6961d1f181315d553de6b53485faed0dcfcf819a1ba3badffe797377d3d1ddaed8e7a0acc0c3d277762262a139f94de49faca167b11bf04f2104a5ab9a73367a6461f7124c91a2c4229ef98e6ebde9aac283c7d029400d71293f488ba169b62c1e94689cf5b248ed4aea62b88d65bb764cfe27d5231a58486e7381df518f4ed81cb905108c54a5050a94ca0e94da20d3794bc5fab9127dc95b6404b1e27b4e28136fc27806f7be798444c33aca88ffd45b860eba0d5033839f5a092863954604f1952bd61dad23b11643fe14f3ade08116aa2c13eee701ccd13e506bd65a1060bf69579aea8c8143cd38c0891a3065f251eba0c20ab9c69ddf28e3bd6400cc203bac8de1882239ad4e1b97b0ae2f1abb7bac7c0d8ef82b97ebfb1f5577f06a3a1377b09ada4db87d342f20ab0eca4b9c206042471307511429cb57a578211f92d3647189861cad9145f5eb26ab696abe50a2a6c1b469df97da28aba4e79b586c348a430f5ea61c4be1032fa61d18581f05a07fb8707c8996e0fff1c3eda59b992687fa12483b9327e10224b20d42e8b3fc4670bf070ced602283273d6818acd1f6da567c44d3f5e1377065d43d87d889843ae48e7fa8ba1634815695b8c480ca271e6e833799c70da80fd79acc09b989667a2294de5da73f0363df9a33ad4dab8d27cf7bed0a06838672e3d07d52b6396e9b5576021d5e925abd533bf161c944795065fdd44e8462e3070c479f1c118276653488dd9b2f1a673f8cad3612ca1fab4388ec9c8f834a01a499adb7b3a9a977672f6d75b41bbdd7f91ceb7e7a88568d17bb432be9e4e96e115075bce197ef4754d2914c2c59e2d7f4c08f0dbe34d31f229428f211bf1d7e8f5c319ed4a8273cb6255eb318851ac4557b0278fac63107a54d407c42f300b843a12abd3b893b46c7efac2e388ab42b87aebe2543bd4c15f459bc50aad10ffe1c1196fb52c26e54bdaa7fbd52451f207ffb073ef4b3f71eedd7da40c89505019739e3fa733bcdc84ff4919e8fe2358129ef28291be1d6426b8bafe88463b1d3cd7273745381c7f65221898e6ad361e88b24c54ccc7ac9a830145b6dc096e2d71ef71ec4f03524cb870b724e08d223bdec2f6fdde6200217a13b5136004d455d66547f5a1793e0cad85677d49e5c558852107007c8136812cf021afaf6f7e8f59883371be46cda412dd9c6fcf187c31252ceb5758901d39cd5355ab386d9a7fe6ea46ebf277aaf809c3023211ea9aa189de4d422080ebb9fec50ffab6b95ba4ae5018accc497e79149ed6047ce561ccc10e9194cdccd5c9fb75175c8dbc9d0a916ad59288f010defbbb50d263041ab37aac0f93253bef6f898cd0825d99d27224f26181f9713b8979da64756c95e7505f25a2688960d6155c3613dcc31b6c337a6dbfc6b12cfde1db22b93bbd5e48534fb0bda8b212577a14dcf665c834b0bd24e5f624d2455fe048dbe930328d7cb632db3b0e244bb5d43390b420b15157a339487fc78976f867d3a361aafdd3f50a93c01882da7c220089a544381db22e2c86b228dc2be01820468460437588952a549d37498e529e62aa62bad1580546bcb1e9a6ed1870b7838d05d12f6e3a041e78b1bdb80894626f20889ccb3a468aa4fb24b9c87cbb28623ce59c6b3c6286db366d08004551a25fe4d8d194a2bb7c52e1c85a5fbe4cb15b171489da121bea1c469a6bb185d63213084e3a81ee54dc03a94dc5ecdda7bfaad1df68021aaf4627c9d529f13e5c81b5ee4dd228949ca16b9a61d186211d153294470907557e5e14ae665013f285fe4d3766e7b3d8ce5e2a14692072d4d8f79354bcc8db8a2a36c8bcd", 0x2000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401070c9, &(0x7f00000020c0)) syz_mount_image$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={0x90, 0x0, 0x0, {0x3, 0x0, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, 0x0) 09:43:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x7, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000114, 0x4) [ 2368.187224][ T35] audit: type=1800 audit(1612431832.316:52281): pid=30472 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:43:52 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000110, 0x4) 09:43:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:52 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010a, 0x4) 09:43:52 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000de, 0x4) 09:43:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, 0x0, 0x0, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:52 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, 0x0, 0x0, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:53 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, 0x0, 0x0, 0x2}}], 0x1, 0x25000000, &(0x7f0000003700)={0x77359400}) 09:43:53 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000002c0)="4eec431850940642f20714ad62311271d56301efeeb1f489d93a09502e4684ccb793551d032f5c3484291e42a4b50379566853f38cd7d327d83e5e5a20ad9c66c0a124903f922a80706011f6fcb3d7df8ba9525c5ee42b7fbc09218461d2cabdae731e8ad1f3739be5b6103271fca67fd42bda178bc482d5e941da74a8508a07b0f45e158338e39dab2f4c7723a970be127d46c2cc992da05caad0cea552f8316e7cb414915283ea6acb6f81adcb66c9ad87b70dd0a2784fbb9314985a96e6495d73fe77679f2d3c8cd836c5ec", 0xcd) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x3fb0b00) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x38, 0x24, 0xd8b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@TCA_RATE={0x6}, @qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x38}}, 0x0) socket(0x8, 0x1, 0x2) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x8, 0x7, 0x9, 0x70, {{0x12, 0x4, 0x0, 0x28, 0x48, 0x66, 0x0, 0x2, 0x29, 0x0, @remote, @private=0xa010102, {[@lsrr={0x83, 0x7, 0x10, [@rand_addr=0x64010100]}, @timestamp={0x44, 0x2c, 0xb1, 0x0, 0x5, [0x400, 0x4, 0xd0b3, 0x12f, 0x4, 0x9, 0xe02e, 0x6, 0x1cdd8743, 0x7fff]}]}}}}}) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@RTM_DELMDB={0xb8, 0x55, 0x400, 0x70bd2c, 0x25dfdbfb, {0x7, r4}, [@MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x3, 0x0, {@in6_addr=@empty, 0x800}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x1, 0x1, {@in6_addr=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x2, 0x4, {@ip4=@local}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r6, 0x1, 0x0, 0x0, {@ip4=@loopback, 0x8edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x0, 0x1, 0x2, {@ip4=@empty, 0x86dd}}}]}, 0xb8}}, 0x40014) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 09:43:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000115, 0x4) 09:43:53 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x218}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x2ce}, {&(0x7f0000000740)=""/73, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41, 0x2}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 09:43:53 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000111, 0x4) 09:43:53 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x0, 0x0) 09:43:53 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010b, 0x4) 09:43:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000df, 0x4) 09:43:53 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x0, 0x0) 09:43:53 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/106, 0x6a}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x9a}, {&(0x7f0000000000)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf, 0x2}}], 0x1, 0x0, 0x0) 09:43:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_void(r0, 0x300, 0x0, 0x0, 0x0) 09:43:53 executing program 4: syz_mount_image$fuse(&(0x7f0000000000)='fuse\x00', 0x0, 0x0, 0x0, 0x0, 0x509cdf405dababfe, &(0x7f00000000c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) 09:43:53 executing program 4: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 09:43:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000116, 0x4) 09:43:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000d40)=@newlinkprop={0x20, 0x2d, 0x1}, 0x20}}, 0x0) 09:43:54 executing program 1: perf_event_open(&(0x7f0000006480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x5a6c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f00000021c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401070c9, &(0x7f00000020c0)) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={0x90, 0x0, 0x0, {0x3, 0x0, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 09:43:54 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000112, 0x4) 09:43:54 executing program 4: perf_event_open(&(0x7f0000006480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f00000021c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={0x90, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x800}}}, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401070c9, &(0x7f00000020c0)) syz_mount_image$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, 0x0) 09:43:54 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010c, 0x4) 09:43:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e0, 0x4) [ 2370.196785][T30582] sd 0:0:1:0: PR command failed: 134217730 [ 2370.207175][T30582] sd 0:0:1:0: Sense Key : Illegal Request [current] [ 2370.227427][T30582] sd 0:0:1:0: Add. Sense: Invalid command operation code 09:43:54 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x41007701, 0x400000) 09:43:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001f00)=@nat={'nat\x00', 0x1b, 0x5, 0x338, 0xd0, 0x1c8, 0xffffffff, 0xd0, 0x0, 0x398, 0x398, 0xffffffff, 0x398, 0x398, 0x5, 0x0, {[{{@uncond, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @remote, @local, @gre_key}}}}, {{@ip={@dev, @multicast2, 0x0, 0x0, 'macvlan0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0xa8}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x0, @multicast2, @private}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, {{@ip={@empty, @broadcast, 0x0, 0x0, 'dummy0\x00', 'netpci0\x00'}, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @multicast2, @rand_addr, @gre_key, @gre_key}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 09:43:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000000)={'syz_tun\x00', @ifru_names}) 09:43:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000000)=0x3, 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x1, 0x4) 09:43:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000117, 0x4) 09:43:54 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000006140)=ANY=[@ANYBLOB="3000000024008b0900"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000b0001"], 0x30}}, 0x0) 09:43:54 executing program 4: r0 = socket(0x2, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000) 09:43:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000400)=@newlinkprop={0x3c, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth0_to_bridge\x00'}, @IFLA_NET_NS_FD={0x8}]}, 0x3c}}, 0x0) 09:43:55 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000113, 0x4) 09:43:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000000)=@newlinkprop={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x10, 0x1a, 0x0, 0x1, [@AF_INET6={0xc, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5}]}]}]}, 0x30}}, 0x0) 09:43:55 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010d, 0x4) 09:43:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e1, 0x4) 09:43:55 executing program 1: perf_event_open(&(0x7f0000006480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x2, 0x0, 0x0, 0x5a6c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000000c0)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f00000021c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={0x90, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x800}}}, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401070c9, &(0x7f00000020c0)) syz_mount_image$fuse(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={0x90, 0x0, 0x0, {0x3, 0x0, 0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:43:55 executing program 4: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000240)='net_prio.ifpriomap\x00', 0x2, 0x0) 09:43:55 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x4}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x853]}, 0x8}) 09:43:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000d40)=@newlinkprop={0x20, 0x43, 0x1}, 0x20}}, 0x0) [ 2371.172848][T30638] sd 0:0:1:0: PR command failed: 134217730 [ 2371.179948][T30638] sd 0:0:1:0: Sense Key : Illegal Request [current] [ 2371.200007][T30638] sd 0:0:1:0: Add. Sense: Invalid command operation code [ 2371.256691][T30651] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 09:43:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000118, 0x4) 09:43:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x3, 0x0, &(0x7f00000001c0)={0x0, 0x0}) 09:43:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)=@ipv6_getnetconf={0x14, 0x48, 0x1}, 0x14}}, 0x0) [ 2371.510343][ T35] kauditd_printk_skb: 15 callbacks suppressed [ 2371.510355][ T35] audit: type=1800 audit(1612431835.637:52297): pid=30618 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14281 res=0 errno=0 09:43:55 executing program 4: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/141) [ 2371.813161][ T35] audit: type=1800 audit(1612431835.947:52298): pid=30637 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:43:56 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000114, 0x4) 09:43:56 executing program 1: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r0, &(0x7f0000000080)) 09:43:56 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x30, 0x24, 0xd8b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x8, 'clsact\x00'}]}, 0x30}}, 0x0) 09:43:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e2, 0x4) 09:43:56 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010e, 0x4) [ 2371.870118][ T35] audit: type=1800 audit(1612431835.947:52299): pid=30645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:43:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x0, 0x0, &(0x7f0000000180), 0x40, &(0x7f0000000200)={[{@shortname_winnt='shortname=winnt'}, {@shortname_lower='shortname=lower'}, {@uni_xlateno='uni_xlate=0'}], [{@appraise='appraise'}, {@fsmagic={'fsmagic'}}]}) 09:43:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001480)=[{0x0}, {&(0x7f0000001200)='M', 0x1}], 0x2, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_u8={{0x11}}], 0x38}, 0x0) [ 2371.931343][ T35] audit: type=1800 audit(1612431835.987:52300): pid=30648 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:43:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000d40)=@newlinkprop={0x20, 0x13, 0x1, 0x0, 0x0, {0x7}}, 0x20}}, 0x0) 09:43:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000119, 0x4) 09:43:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') 09:43:56 executing program 4: timer_create(0x2, 0x0, &(0x7f0000001080)) timer_settime(0x0, 0x0, &(0x7f0000001140), 0x0) [ 2372.407897][ T35] audit: type=1800 audit(1612431836.537:52301): pid=30668 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14280 res=0 errno=0 09:43:56 executing program 1: syz_emit_ethernet(0x12, &(0x7f0000000000)={@multicast, @random="0ad127548a3e", @val={@void}, {@mpls_uc}}, 0x0) [ 2372.579437][ T35] audit: type=1800 audit(1612431836.707:52302): pid=30677 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14288 res=0 errno=0 [ 2372.666521][ T35] audit: type=1800 audit(1612431836.797:52303): pid=30688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14285 res=0 errno=0 09:43:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @dev}, @in={0x2, 0x0, @loopback}, @nl=@unspec, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='nr0\x00'}) 09:43:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x14}}, 0x0) 09:43:56 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010f, 0x4) 09:43:56 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000115, 0x4) 09:43:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e3, 0x4) [ 2372.782664][ T35] audit: type=1800 audit(1612431836.907:52304): pid=30686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:43:57 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) 09:43:57 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@timestamping={{0x10}}], 0x10}, 0x0) 09:43:57 executing program 1: io_uring_setup(0x1d8a, &(0x7f0000003640)={0x0, 0xbed1, 0x39}) 09:43:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011a, 0x4) 09:43:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000006f40)={0x0, 0x0, &(0x7f0000006f00)={&(0x7f0000000200)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CSA_IES={0x24, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x16, 0xbb, [0x7, 0x6, 0x7, 0xfffc, 0x8, 0x5fd4, 0x6a, 0x3ff, 0x461]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x7]}]}, @NL80211_ATTR_CSA_IES={0xe70, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x6]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0xa, 0xbb, [0x5, 0x200, 0x0]}, @beacon_params=[@NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_PROBE_RESP={0x605, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0x1d5, 0x91, "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"}], @NL80211_ATTR_CSA_C_OFF_BEACON={0x4}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x669, 0x91, "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"}]]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 09:43:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x30, 0x0, &(0x7f0000000300)) [ 2373.234077][ T35] audit: type=1800 audit(1612431837.367:52305): pid=30700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14280 res=0 errno=0 09:43:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000900)={0x0, 0x1, 0x6, @link_local}, 0x10) 09:43:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @sco, @xdp, @sco={0x1f, @none}, 0x0, 0x700}) 09:43:57 executing program 4: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xc8) 09:43:58 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000110, 0x4) 09:43:58 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000116, 0x4) 09:43:58 executing program 1: timer_create(0x2, 0x0, &(0x7f0000001080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x77359400}}, &(0x7f0000000280)) 09:43:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x6, 0x0, &(0x7f0000000300)) 09:43:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e4, 0x4) 09:43:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x894a, &(0x7f0000001280)) 09:43:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011b, 0x4) 09:43:58 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0xb, 0xffffffffffffffff) 09:43:58 executing program 1: timer_create(0x2, 0x0, &(0x7f0000001080)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000001140)={{}, {0x0, r0+10000000}}, 0x0) 09:43:58 executing program 4: syz_io_uring_setup(0x0, &(0x7f0000000180), &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) 09:43:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000004640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x42, 0x0) 09:43:58 executing program 4: syz_emit_ethernet(0x22, &(0x7f0000000000)={@empty, @multicast, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @dev, "", @link_local}}}}, 0x0) 09:43:59 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000111, 0x4) [ 2374.798258][ T35] audit: type=1800 audit(1612431838.927:52306): pid=30740 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:43:59 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000117, 0x4) 09:43:59 executing program 1: syz_open_dev$vcsn(&(0x7f0000000580)='/dev/vcs#\x00', 0x1, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, &(0x7f0000000140), 0x0) 09:43:59 executing program 4: pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xb, 0xffffffffffffffff) 09:43:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e5, 0x4) 09:43:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8905, &(0x7f0000000080)={0x0, @sco, @xdp, @sco={0x1f, @none}}) 09:43:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011c, 0x4) 09:43:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xee) 09:43:59 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000300)) 09:43:59 executing program 4: r0 = io_uring_setup(0x335a, &(0x7f0000000000)) io_uring_enter(r0, 0x0, 0xfcc3, 0x3, 0x0, 0x0) 09:43:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000180)="89dfb1ce2cec2492f3b3fac2cbcfe569", 0x10) 09:43:59 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan0\x00'}) 09:43:59 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000112, 0x4) 09:43:59 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000118, 0x4) 09:43:59 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RMKNOD(r0, &(0x7f00000000c0)={0x14}, 0xffffffffffffff05) write$P9_RUNLINKAT(r0, &(0x7f0000000080)={0x7}, 0x7) 09:44:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e6, 0x4) 09:44:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000030c0)={0x0, 0x0, 0x0}, 0x10050) 09:44:00 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x21, 0x0, @private, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "039a58", 0x0, "91c304"}}}}}}, 0x0) 09:44:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011d, 0x4) 09:44:00 executing program 1: syz_io_uring_setup(0x5bc1, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, 0x3ce}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:44:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x0, 0x2c, 0x0, "02794570ce5f058330a7fa4862157820fe70c26220e623307957ef8b7bdb8404a6c07a27f1c01c263eb0af7b915d7e9cd59e1ffd6555e480e9b4dc80059e4a4f176fd938a76f493d2a1605adea15b7bf"}, 0xd8) 09:44:00 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xe, 0xffffffffffffffff) 09:44:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @sco, @xdp, @sco={0x1f, @none}, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='veth1_to_batadv\x00'}) 09:44:00 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000113, 0x4) 09:44:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000300)=0x88000000) 09:44:00 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000119, 0x4) 09:44:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @dev}, @in={0x2, 0x0, @loopback}, @nl=@unspec, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0x43e}) 09:44:00 executing program 4: msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x500) 09:44:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e7, 0x4) [ 2376.638011][ T35] kauditd_printk_skb: 6 callbacks suppressed [ 2376.638021][ T35] audit: type=1800 audit(1612431840.767:52313): pid=30820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14281 res=0 errno=0 09:44:00 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, 0x0, 0x0) [ 2376.754782][ T35] audit: type=1800 audit(1612431840.807:52314): pid=30817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14287 res=0 errno=0 09:44:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011e, 0x4) 09:44:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x89b1, &(0x7f0000001280)) 09:44:01 executing program 4: r0 = socket(0x11, 0x2, 0x0) accept4$vsock_stream(r0, 0x0, 0x0, 0x0) [ 2376.959656][ T35] audit: type=1800 audit(1612431841.087:52315): pid=30836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:44:01 executing program 4: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1) 09:44:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8943, &(0x7f0000001280)) 09:44:01 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000114, 0x4) 09:44:01 executing program 4: r0 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000080)) [ 2377.360770][ T35] audit: type=1800 audit(1612431841.497:52316): pid=30852 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:44:01 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011a, 0x4) 09:44:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 09:44:01 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000100)={'vlan0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) [ 2377.454868][ T35] audit: type=1800 audit(1612431841.587:52317): pid=30865 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:44:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e8, 0x4) 09:44:01 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x1404, 0x0) [ 2377.555496][ T35] audit: type=1800 audit(1612431841.687:52318): pid=30861 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14278 res=0 errno=0 09:44:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011f, 0x4) 09:44:01 executing program 4: syz_io_uring_setup(0x4, &(0x7f0000000180)={0x0, 0x533d}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 09:44:01 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @private=0xe0000000, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "039a58", 0x0, "91c304"}}}}}}, 0x0) [ 2377.723077][ T35] audit: type=1800 audit(1612431841.857:52319): pid=30879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:44:01 executing program 1: r0 = openat$null(0xffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0xa100098d) 09:44:01 executing program 4: r0 = syz_io_uring_setup(0x7cdd, &(0x7f0000000000), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 09:44:02 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000115, 0x4) 09:44:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x4, 0x0, &(0x7f0000000300)) [ 2378.114095][ T35] audit: type=1800 audit(1612431842.248:52320): pid=30892 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:44:02 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011b, 0x4) 09:44:02 executing program 4: timer_create(0x2, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x3938700}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000180)) 09:44:02 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000100)={'vlan0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) [ 2378.402803][ T35] audit: type=1800 audit(1612431842.538:52321): pid=30897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:44:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e9, 0x4) 09:44:02 executing program 4: syz_io_uring_setup(0x2e, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x72b0, &(0x7f0000000040), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) [ 2378.522860][ T35] audit: type=1800 audit(1612431842.628:52322): pid=30902 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:44:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000120, 0x4) 09:44:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000001080)=[{{0x0, 0x0, 0x0, 0x700}}], 0x1, 0x0, 0x0) 09:44:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 09:44:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000006f40)={0x0, 0x0, &(0x7f0000006f00)={&(0x7f0000000200)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CSA_IES={0x24, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x16, 0xbb, [0x7, 0x6, 0x7, 0xfffc, 0x8, 0x0, 0x5fd4, 0x6a, 0x461]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x7]}]}, @NL80211_ATTR_CSA_IES={0xe70, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x6]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0xa, 0xbb, [0x5, 0x200, 0x0]}, @beacon_params=[@NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_PROBE_RESP={0x605, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0x1d5, 0x91, "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"}], @NL80211_ATTR_CSA_C_OFF_BEACON={0x4}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x669, 0x91, "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"}]]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 09:44:02 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = getgid() sendmmsg$unix(r0, &(0x7f0000000680)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="100000000100000001000000", @ANYRES32, @ANYBLOB="18"], 0x40}], 0x1, 0x0) 09:44:02 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000116, 0x4) 09:44:02 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002480)='ns/ipc\x00') setns(r0, 0x0) 09:44:03 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011c, 0x4) 09:44:03 executing program 4: syz_io_uring_setup(0x48e6, &(0x7f0000000180)={0x0, 0xadac, 0x8}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200), 0x0) 09:44:03 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002480)='ns/ipc\x00') setns(r0, 0x0) 09:44:03 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ea, 0x4) 09:44:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000002540)={&(0x7f00000026c0)=ANY=[@ANYBLOB="40000000c55d51"], 0x22c4}}, 0x0) 09:44:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000121, 0x4) 09:44:03 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002480)='ns/ipc\x00') setns(r0, 0x0) 09:44:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000400)=@xdp, 0x80) 09:44:03 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000002480)='ns/ipc\x00') setns(r0, 0x0) 09:44:03 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'rose0\x00'}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) 09:44:03 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000117, 0x4) 09:44:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000006f40)={0x0, 0x0, &(0x7f0000006f00)={&(0x7f0000000200)={0xec4, 0x0, 0x654855cc9cf77c26, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4c9, 0x44}}}}, [@NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CSA_IES={0x24, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x16, 0xbb, [0x7, 0x6, 0x7, 0xfffc, 0x8, 0x0, 0x5fd4, 0x0, 0x461]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x7]}]}, @NL80211_ATTR_CSA_IES={0xe60, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x0]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0xa, 0xbb, [0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_PROBE_RESP={0x5f1, 0x91, "b5f24c2e1fe82ba6efab9e6fe759fdb82050ee11698b2423050e8284fd99764a2e703119f5a9af231d973043689a7e28aa7fb707ffca154876f480bd2f2dad06aaa88d2b5b0f2fb8370f358de4caa9432ed1d78118bd4e4957a8a71c6119901df6c2165120b637937a7fcbf9372c437251daef7b64c8eb65534476f58b50eec8a4ed18e6580caaed650ec5536ca9dc751cc1dfe13bf8f70c1751a9b76f487ed962bb9be860260f5a1e297374cf7dbc1a0e80d8d38625009a38410c65515cfe3db800adca37aa1ae563c03f887aeb46d9dd2f7d9705c85522628f74b65729763a0f8f360986c83533bc460b47c07452baea0ad8413b450459875ace049a886ae45921f996e8d75b125a3c5dc08f84382a1a2fc3a2bcb86b8f5ac5bfee4a42a5069347a5d21ba75876a40cca2254a1abe8ad0543a2a43ab531210f07de555a86f15b678fe1f7088546b9dca8e8ec955d4a150e7ce85cf48175f5e2dc39c37918e476effbfd7e5d894bbb4cdc7286e98cf8e342e75a38745ebc2f5181f34f0cccf481d234593ae1622392d37c3b500c5e60510656d5567a08d1223228cd3db8487eb54ce26eefe164a58c43700b730d15326eee2bbdd210cfeba50f77c74fb974cd1df201a1286293241e6fb70a558c1775457dcf00c66bbf77a8e39a10ea263ac49d2944786e5f6de64362c24e5ca2f6380d67dbd16e1033984ea5c80f8e628957b0cf18e299782497c7f7136668abc8d1f8c1e5d4b536eb6d6a9d6102f02d74ede721f19c8c33c1a214053e5371966b76c4dac9eeefed130b0e0c421e653e05a94c259a8d4c72ce4d625acdf94a144bbc140a13b7021ae2178ac55f15f0f4c5123d613d9cd1879a71219451c392c031393465006489a3808e5a3ed0d90bfc33bb69145bdd04e8977b545f95e98ecd34777438da34234f2ad9171290ab69fe130908df31b2e4853340e058bf0d97e6fc77508dcdfa2b3d2abb4e3360d124042b0cf4853f4b730aa34a6b7008aff4922cc6a80d6d666914c8e7699565435b4454bb635e63280c705824856d3706bac79b57867d0b8070666c8438ec1a3297db7b59f4a84f3cf77e6a52c2c21a978c4a7c98d889a39e0899125cd9d45c65c266e881d2a68b1c7ecf1c4f2da925dbee3606521c64b8f664e256233188bb967de7d17a06fae44fb62521d05119530393b7f9efb32467d6d250cc55a7305f6781b4f9a4de0ea0fc8e5d2d3d54e786ee99291ee0420003fa543c16f536e0829b0637c7c480da371c0ce21a259a2560257ab6e5e1c0adb70017b91ab98b5c3dea4414bf90de041ad13da996e3b5c0fb7d41c648291785c88da666fb2922bc918286b0cb72664b8b4c58b589e6072aa6e7bab0fd0e4fdcdf78c0d1c6d39cec6358bbc087ad99dd66a848cc375bbae5d0b550b9a4a6c2b933b9a215417b56ad3b74be024650a368ecfa61d40cf8c8a8f78d40ad0eea481f65224dc6690f6139896a5101189a8ada2acb019bbe31cc91dfb2f1d9dc2effa2a652883d46c533c7ba100129fba47c60dc2756d2c99986f4d71838731fdee2e2cb535feabd6f751a28e2661d0fa9becc07004ef7e8944cbb97c7124a86f166c3e256337acb97dab5e9761b0e160601339d902d15df2bfa7534f33271ae8c9f4ac9270a20ee2831dd44c6637f6031065a3a0373e5067c14585587ff8fd0d39af2bb1cec1fc120a814d5ec7107d9858a55219a1541d81cbd73802343b7e900d867b015efd944e425d803b1e4ee6c6623aab9e360584d1b3231d6f126f037fbe673118af772a54e6e4b9139b464c3ad85f36b183fd55522d316bad25aba7a96dd706318388c8f5a2c297a1b926cb9036f886bd92cf011d47f6ae97dfc7dc8c1a7f74094dfca8227c631d43af64695408c62cab2c3e162cb336ace74d79c80812187e14d8dc2570285a0276ff4b4cd1387311ec3d1ca3c7f3290b2b52de2b5e833616a0f9a6053c168a920592efbcc5897f2e061254fcaf9410091d8ac2261336ab92a0173843910b4b60cb1da04ecb5878399804c2bf03f4185e1d87e5c6e13556d300d533f3badad73c0d73bf834aee23bee4a7a195c15082e036f1690e71b868e4f75d62c370ffc400f865b0b7b6adb1083bdf709fedf0986fd7e68"}, @NL80211_ATTR_PROBE_RESP={0x3c4, 0x91, "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"}, @NL80211_ATTR_FTM_RESPONDER={0x88, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x4}, @NL80211_FTM_RESP_ATTR_LCI={0x7e, 0x2, "4b022ce3068890e67727b332f8d2f7260b2b0f70044e66f0e85fdbe43a087e211cef80f57a79d2cf559695dab8feef489e936cecc2b1793922a63cb968396bf05cbbe1d8aa4e1c8a6b101cc7af76a1ef691fa0b5cbb20243ab9048a085c635172e3b633f388afdf7c7dbed4bb06fba03c580d03abc0624331064"}]}], @NL80211_ATTR_CSA_C_OFF_BEACON={0x12, 0xba, [0x8, 0x1, 0x8, 0xfff, 0xbaf, 0x4, 0x7]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0x4}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x3e6, 0x91, "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"}]]}, @NL80211_ATTR_CSA_IES={0x8, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_BEACON={0x4}]}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x5b}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 09:44:04 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011d, 0x4) 09:44:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000eb, 0x4) 09:44:04 executing program 1: r0 = syz_io_uring_setup(0x2e, &(0x7f0000000000), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 09:44:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@nat={'nat\x00', 0x1b, 0x5, 0x4a8, 0x33c, 0x33c, 0xffffffff, 0x33c, 0x0, 0x470, 0x470, 0xffffffff, 0x470, 0x470, 0x5, 0x0, {[{{@uncond, 0x0, 0xd4, 0x11c, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @icmp_id, @icmp_id}}}, {{@uncond, 0x0, 0xa4, 0xec}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@dev, @ipv4=@dev, @icmp_id}}}, {{@uncond, 0x0, 0xa4, 0xec}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@private, @ipv6=@empty}}}, {{@uncond, 0x0, 0xa4, 0xec}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @port, @icmp_id}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x504) 09:44:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000122, 0x4) 09:44:04 executing program 4: timer_create(0xb, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, 0x0) 09:44:04 executing program 4: sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 09:44:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @dev}, @in={0x2, 0x0, @loopback}, @nl=@unspec}) 09:44:04 executing program 4: syz_emit_ethernet(0x1a, &(0x7f00000002c0)={@multicast, @random="0ad127548a3e", @val={@void}, {@llc={0x806, {@snap={0x0, 0x0, '<', "3d9466"}}}}}, 0x0) 09:44:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f0, 0x144, 0x17c, 0x17c, 0x0, 0x5, 0x228, 0x260, 0x260, 0x228, 0x260, 0x3, 0x0, {[{{@uncond=[0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x114, 0x144, 0x52020000, {}, [@common=@unspec=@connbytes={{0x38, 'connbytes\x00'}}, @common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffff, 0x7}, {0xffff}}}}, {{@ipv6={@mcast2, @empty, [], [], 'ip6tnl0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0xe4}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "05707e699034125bdc0c64eacf9048b46be21c53f85cde4e245e2faf8b0c"}}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x34c) 09:44:04 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000118, 0x4) 09:44:04 executing program 4: socket$inet6(0xa, 0x2, 0x9) 09:44:05 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011e, 0x4) 09:44:05 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x80108906, 0x0) 09:44:05 executing program 4: syz_io_uring_setup(0x5763, &(0x7f0000000000)={0x0, 0x0, 0x4}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0) 09:44:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ec, 0x4) 09:44:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000123, 0x4) 09:44:05 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000119, 0x4) 09:44:05 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)='*-\x00') 09:44:05 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/user\x00') 09:44:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0x80) 09:44:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xb, r0, &(0x7f0000000740)='logon\x00', &(0x7f0000000780)='eth\x00') 09:44:05 executing program 4: r0 = openat$fuse(0xffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_BMAP(r0, 0x0, 0x0) 09:44:05 executing program 1: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xcc) 09:44:05 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011f, 0x4) 09:44:05 executing program 4: pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xb, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000040)) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 09:44:05 executing program 1: pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 09:44:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ed, 0x4) 09:44:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000124, 0x4) [ 2381.657140][ T35] kauditd_printk_skb: 15 callbacks suppressed [ 2381.657150][ T35] audit: type=1800 audit(1612431845.788:52338): pid=31063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:44:05 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011a, 0x4) 09:44:05 executing program 1: syz_io_uring_setup(0x72b0, &(0x7f0000000040), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 09:44:05 executing program 4: socketpair(0x2, 0xa, 0x3ff, &(0x7f0000000000)) [ 2381.737572][ T35] audit: type=1800 audit(1612431845.838:52339): pid=31066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:44:06 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @private=0x1000000, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "039a58", 0x0, "91c304"}}}}}}, 0x0) [ 2381.811467][ T35] audit: type=1800 audit(1612431845.848:52340): pid=31074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:44:06 executing program 1: pselect6(0x40, &(0x7f00000005c0)={0x6}, 0x0, 0x0, &(0x7f0000000680)={0x0, 0x3938700}, 0x0) 09:44:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', 0x0}) 09:44:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) recvmmsg(r0, &(0x7f0000003580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2382.419619][ T35] audit: type=1800 audit(1612431846.548:52341): pid=31108 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2382.457932][ T35] audit: type=1800 audit(1612431846.588:52342): pid=31091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:44:06 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000120, 0x4) 09:44:06 executing program 1: syz_io_uring_setup(0x51d9, &(0x7f0000000340), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) 09:44:06 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011b, 0x4) 09:44:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000125, 0x4) 09:44:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ee, 0x4) [ 2382.530612][ T35] audit: type=1800 audit(1612431846.638:52343): pid=31090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14291 res=0 errno=0 [ 2382.598330][ T35] audit: type=1800 audit(1612431846.698:52344): pid=31105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:44:06 executing program 1: syz_io_uring_setup(0x31b7, &(0x7f0000000300), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000380), 0x0) syz_io_uring_setup(0x31bb, &(0x7f0000000400)={0x0, 0xcee2, 0x8}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) 09:44:06 executing program 1: r0 = syz_io_uring_setup(0x2f44, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0xa, 0x0, 0x0) 09:44:07 executing program 1: syz_io_uring_setup(0x2e, &(0x7f0000000000), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:44:07 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000004ac0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@cred={{0x18, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x18}], 0x1, 0x0) 09:44:07 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 09:44:07 executing program 4: r0 = syz_io_uring_setup(0x2f44, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, 0x0, 0x0) 09:44:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x5421, &(0x7f0000001280)) [ 2383.241634][ T35] audit: type=1800 audit(1612431847.378:52345): pid=31127 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14298 res=0 errno=0 [ 2383.295265][ T35] audit: type=1800 audit(1612431847.428:52346): pid=31125 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14282 res=0 errno=0 [ 2383.340477][ T35] audit: type=1800 audit(1612431847.468:52347): pid=31129 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:44:07 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000121, 0x4) 09:44:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000006f40)={0x0, 0x0, &(0x7f0000006f00)={&(0x7f0000000200)={0xec4, 0x0, 0x654855cc9cf77c26, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4c9, 0x44}}}}, [@NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CSA_IES={0x24, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x16, 0xbb, [0x7, 0x6, 0x7, 0xfffc, 0x8, 0x0, 0x5fd4, 0x6a, 0x3ff]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x7]}]}, @NL80211_ATTR_CSA_IES={0xe60, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x6]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0xa, 0xbb, [0x5, 0x200, 0x2]}, @beacon_params=[@NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_PROBE_RESP={0x433, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0x1e4, 0x91, "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"}], @NL80211_ATTR_CSA_C_OFF_BEACON={0x4}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x7c7, 0x91, "59b48b6f273ada064ac010e71ede82223f1cd971eeacd2ba4a291c9e07bc5d526f46ac750311a3215b60692eff3999343e8d520b4eb9bddc13f60d8c7d6229b8bd8822b62f8270a309a6923aa2354ed5815cbeb6e84f9c3eecdd401202c32cb729f0ab72922edd40a4839af6a8d062f510e0ca38f1a6bd6c09d1af9f3c5adc3579a108270eb2021ac2576a2a895745d6e83f861a8580239ded5628b8e79e8935cbeb6753c577ce880a173fa1677ae040e7bee6a25d309242fafacab8ac3048ca0c295effeee0c7665033773da59c7cd79baf07f229b072da87391b8209f17cbe101fef242c9a03a9a7f9f82302079dc5f3970f0ca7390adbaf66f7a1ca4170052c2d7682ce411eafad75fb54fc35fd1cd3f575395704e8b40b101adfddaf3db2408d40ca935789c5f86e37de84004fd921695d4027119ac22c93788c5a8a384e45035b503456d377f4cd627d38c0ea684b72989fbe7a070f2d62c48175d4a971a734562204a8a0f53b061965b77f2a6a3aeb9e4aa06bfaaf549f04f570f7f398838272d545965945471c9528f52f516e5cb5d92ab099f1cab1fb23f6a7cd050731f4e2a8f0c7178bc3436d67b461ea8c61aef2f0e3abeff63b3c1011998e850c5058c335094d19f11ede34d236cd4d374b01a3d7d1bd355dfb2aeb752ded3a0f438772b96c62d3191640a155edfa4e379fe8ca3e40b70614c66fa86fc4f271bc65a962c20eeae59a244febbed6e26fab696c66007fc609f99cf9266a0f00fa7ded0db27b5d8b144c9cb69025641a5b84e87c8078b09d781cc134dc2fc1fa8cf91c886bb52b2e40c3c5d610d43977250fe0fcb262e6191504917eff1f72739e431dd7e1c0d9998051d03e4ae35ff7f6e88d81a544cfd762eb1e58a5212214d29ab1e661a25b438c550fbdce042f0a2b3226d58dc18e02736d3c55a8128a1fe70ef67e6c09ad213dfa704336c52cf6a28663efabcaf88c0504690355702be018137d0c20841ec1ec937ad632b9e1fb8396ed1a91b4dbc6ba23c3ce7e702d1202c6d95329b28ad3d8f8b5655575cd72c4224ec9a2f7398f00c06f3ef888f4772f1923073b8fb50f3f112b051010e9a532597b4c4cc0f3a12ddf94ef0797ef1fac7cd4c76b54e0472c592c1437cb068bd7962df500db2cd0659b85b7389a17e0d96ca3d8a1ad13b3462015b957df375ebf7f902c9413ef350aef29bd77da15a97c513c567f80a304c8c3798dd3fc5470907239921139c4c14e8b61ea1d27929daa3776ce4b399b599d5a595636292171edf3030f2789b3f506b9e8884a288f675871358226c117627a683a9fd2e1d2748733808f1d2b83b5316b5d35c5ab99d5674abbb912b0729882410a82690df0564b53ff1b57c0ef187040337ecba3b0d594071860f0d64b340c023f58f773a07e815f7cb27ed94b7b9d89f4d85cfd42d279f517307292be511bc304dda6adeade0390c816f71f3ba4057b4d3c17a99e6fb282b13f81550d0d924cbdc9c23e653c56f77d779f3c1116a52884188964b8419b1b1da0af6c3effea7bdc270d2694661879546d16e1651ac80d8fbd281cd1a91b2529f2eea3fed4d02f3f157c4ebc8554e6bea356ff46adfe65bca0f8e3fc4fee7e80eb0e6fc4d90eea42f2108142ee2193b4f746fcd714755e8f3685f824ad6a0a7b6fc452b8f3b9cb8ff85c849fb476396de7e40cdb2c660ce63abe455571b8a40b614ff7c4040601a9a71825a290bef5cb61fde287d584a199afa38b21c2f0fd3a60bdb2047c6e80fe0183faaddc07badda5217fd9bfa14857e86b8192888d77dde8bc2bfb88760ecd2a9d88f4e558dde5c3fb6a1fc45684c75a4dd18e03f1809de89a16e027387f5180f5f8a522059f9c42f35c1bc830551a3c3aef506803304aa6292910ea0e5a8eda8d56d67d64e9e4bf97e9fc3ec059bad5b0019dc37f3b8090fdcbf0a52bf3129fcd12c20402977176b2e1442bb4651e47ac6b6d680129ad29f7374673062a79f36bff6fd4e51c7480c73b40297594a27b8c28621c5ac46b55a55ab01d348a17e615bd57e32dfa361083b488c2e3e38907d3722d1c06b390ed688711a4efe099ba3713b6e6e3f2371c9a14b8128f68ebc7cfaac24dc834c3179b993b242fddf7d0d9c4fd0fb6f40c61e971a80a35560848291262064d3d3c036739e15327dce72aca3df61abb0d07fb1440e02cf3d34392d5375d5b2f1496f8736e03a105600730673d27d957f19cf4a98a2f51686bfe1d23a5cd39291eff8d193f9028ca70ae11afda6ed2c77fe3c98075a4ad740333ead8d0294f727b1a5752563b1702c43760829ae0a154475278b03870f620793029496c827486b4d6f3cbc0eed678722fe18511a8c4607fa04d65094dec9b8b43035724400aef03bc23ed053b2aa451bbafa2218e7b95af3281370a74782bc3484003e766730956ed24b3818959f222f805558ff78202c456e7ecaf340f0aac80919d3463a46463dd468c5eeec7fdd25bfc491198e4e07c2c0a1372aeb083be147dc8fd7268193264d1b4a16461d6c44f65ccc9c6d83fbb2420104365475f0e17a67020aeafbfc76f57f3d944e72e9d7b5bb878c81c51fb7594dafb4487439e10abbc890017d791515aa6ae079ed1666c8117d081d4f406c3210cf2fe3270225919934263fb49a5689ff47cfe1bbc412dd173ccb6822d583f16c2711a919bc91e8431109ed222f130ec8f9060a87571f92522ee8e881323f7ca4fe7881f2c93ae69d0d67aabf4ab25ca7675f35c472a66d15a2ea1a4f4d4c3540de944fb835f266bb140e50eb616402f4d"}, @NL80211_ATTR_FTM_RESPONDER={0x5c, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x57, 0x3, "c6eb690b7bcca006f7ad3dbe1169a571c2f8f9acb0ed4d1e33233b3a83a0eb900c0949c1d8e4a581cc88635b9f4ee824ab2df3a94bd2d164c390e33b9ba5293a20e19f635042e7853c64484560cb22d7fae5cd"}]}]]}, @NL80211_ATTR_CSA_IES={0x8, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_BEACON={0x4}]}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x5b}]}, 0xec4}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 09:44:07 executing program 1: prctl$PR_CAPBSET_DROP(0x18, 0x1000017) 09:44:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ef, 0x4) 09:44:07 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011c, 0x4) 09:44:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000126, 0x4) 09:44:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8993, &(0x7f0000001280)) 09:44:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee00, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r0) 09:44:07 executing program 1: openat$null(0xffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x28041, 0x0) 09:44:07 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 09:44:07 executing program 1: pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0xcc) 09:44:07 executing program 4: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x6140) 09:44:08 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000122, 0x4) 09:44:08 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0xb, r0, 0x0, 0x0) 09:44:08 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000002200)={'team_slave_1\x00', @ifru_names}) 09:44:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f0, 0x4) 09:44:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000127, 0x4) 09:44:08 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011d, 0x4) 09:44:08 executing program 4: r0 = syz_io_uring_setup(0x2f44, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x5, 0x0, 0x0) 09:44:08 executing program 1: socket(0x1, 0x0, 0x20) 09:44:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x5452, &(0x7f0000001280)) 09:44:08 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @multicast, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x3, 0x0, 0x21, 0x0, @private, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "039a58", 0x0, "91c304"}}}}}}, 0x0) 09:44:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000100)={'vlan0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) 09:44:08 executing program 1: syz_io_uring_setup(0x2e, &(0x7f0000000000)={0x0, 0x0, 0x6}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) 09:44:09 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000123, 0x4) 09:44:09 executing program 4: request_key(&(0x7f0000000980)='asymmetric\x00', &(0x7f00000009c0)={'syz', 0x2}, 0x0, 0x0) 09:44:09 executing program 1: syz_emit_ethernet(0x14, &(0x7f0000000000)={@multicast, @random="0ad127548a3e", @val={@void}, {@mpls_uc={0x8847, {[], @generic="8d31"}}}}, 0x0) 09:44:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f1, 0x4) 09:44:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000128, 0x4) 09:44:09 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011e, 0x4) 09:44:09 executing program 4: r0 = syz_io_uring_setup(0x2f44, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_setup(0x6bb9, &(0x7f0000000100)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 09:44:09 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/pid_for_children\x00') 09:44:09 executing program 4: setresuid(0xee00, 0xee01, 0x0) 09:44:09 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x182681) write$P9_RFLUSH(r0, &(0x7f00000000c0)={0x7}, 0x7) 09:44:09 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, r1) 09:44:09 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x182681) write$P9_RFLUSH(r0, &(0x7f00000000c0)={0x7}, 0x7) 09:44:10 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000124, 0x4) 09:44:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000140)) 09:44:10 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x182681) write$P9_RFLUSH(r0, &(0x7f00000000c0)={0x7}, 0x7) 09:44:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f2, 0x4) 09:44:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000129, 0x4) 09:44:10 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011f, 0x4) 09:44:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000300)) 09:44:10 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x182681) write$P9_RFLUSH(r0, &(0x7f00000000c0)={0x7}, 0x7) 09:44:10 executing program 1: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) 09:44:10 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000200)={0x8}, &(0x7f0000000240), 0x0) 09:44:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000000)=@caif=@rfm={0x25, 0x0, "4d2c7f97e76019594db52ec3511d5e5a"}, 0x80, 0x0}, 0x0) 09:44:10 executing program 4: r0 = openat$null(0xffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x0) 09:44:10 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000125, 0x4) 09:44:10 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8906, 0x0) 09:44:10 executing program 4: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000012c0)='logon\x00', &(0x7f0000001300)=@secondary='builtin_and_secondary_trusted\x00') 09:44:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f3, 0x4) 09:44:10 executing program 1: r0 = openat$null(0xffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000340)='cpuset.mem_exclusive\x00', 0x2, 0x0) 09:44:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x13, 0x0, &(0x7f0000000300)) 09:44:10 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000120, 0x4) 09:44:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012a, 0x4) 09:44:10 executing program 1: pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x64) 09:44:10 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000680)) 09:44:10 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000540)='hfsplus\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000880)) 09:44:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000045c0)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 09:44:11 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000126, 0x4) 09:44:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xd08f}], 0x8042, &(0x7f0000002500)={[], [{@euid_gt={'euid>', 0xee01}}]}) 09:44:11 executing program 4: sendmsg$SMC_PNETID_GET(0xffffffffffffffff, 0x0, 0x20040040) syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00') syz_mount_image$hfsplus(&(0x7f0000000540)='hfsplus\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x4, &(0x7f0000000800)=[{&(0x7f00000005c0)="9a2e8db67cfe4919c5ba86e8ab84692d444c242b223918b0d47e3fbfdabe4cb66899f9c25d7667143ebcd371184bb5b104a4", 0x32, 0x7fffffff}, {&(0x7f0000000680)="e95bb53599d5c6", 0x7}, {&(0x7f0000000700)='f', 0x1}, {0x0, 0x0, 0x1f}], 0x6a6c623b42af3d06, &(0x7f0000000880)={[], [{@smackfshat={'smackfshat', 0x3d, '#]}'}}, {@dont_appraise='dont_appraise'}]}) [ 2387.214297][ T35] kauditd_printk_skb: 17 callbacks suppressed [ 2387.214307][ T35] audit: type=1800 audit(1612431851.349:52365): pid=31334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14285 res=0 errno=0 09:44:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f4, 0x4) 09:44:11 executing program 4: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) close(r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 09:44:11 executing program 1: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f00000005c0)="9a", 0x1}], 0x0, 0x0) [ 2387.406936][ T35] audit: type=1800 audit(1612431851.539:52366): pid=31353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14300 res=0 errno=0 [ 2387.447672][ T35] audit: type=1800 audit(1612431851.539:52367): pid=31350 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:44:11 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000121, 0x4) 09:44:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012b, 0x4) 09:44:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={0x0}}, 0x20008801) [ 2387.502331][ T35] audit: type=1800 audit(1612431851.579:52368): pid=31346 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14275 res=0 errno=0 09:44:11 executing program 4: syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f0000000700)='f', 0x1}], 0x0, 0x0) 09:44:11 executing program 1: openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') 09:44:11 executing program 1: syz_mount_image$hfsplus(&(0x7f0000000540)='hfsplus\x00', 0x0, 0x0, 0x1, &(0x7f0000000800)=[{&(0x7f00000005c0)="9a2e", 0x2, 0x7fffffff}], 0x0, &(0x7f0000000880)) [ 2388.109252][ T35] audit: type=1800 audit(1612431852.239:52369): pid=31385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14273 res=0 errno=0 09:44:12 executing program 4: openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:44:12 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[], 0x8) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @mcast2, 0x8}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) write(r0, &(0x7f0000000200)="5da4000000ec52000000000000000000060000dac2ac0000", 0x18) 09:44:12 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000127, 0x4) 09:44:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f5, 0x4) 09:44:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012c, 0x4) [ 2388.165316][ T35] audit: type=1800 audit(1612431852.299:52370): pid=31368 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14283 res=0 errno=0 09:44:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002500)) [ 2388.262829][ T35] audit: type=1800 audit(1612431852.329:52371): pid=31384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14279 res=0 errno=0 09:44:12 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000122, 0x4) 09:44:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000180)='.\x00', 0xc60000f2) open(&(0x7f0000000340)='./file0\x00', 0x1031c2, 0x0) 09:44:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) [ 2388.363658][ T35] audit: type=1800 audit(1612431852.489:52372): pid=31392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14285 res=0 errno=0 09:44:12 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000880)='/dev/fuse\x00', 0x2, 0x0) 09:44:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000180)='.\x00', 0xc60000f2) open(&(0x7f0000000340)='./file0\x00', 0x1031c2, 0x0) 09:44:12 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x101000, 0x0) 09:44:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000180)='.\x00', 0xc60000f2) open(&(0x7f0000000340)='./file0\x00', 0x1031c2, 0x0) 09:44:12 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$9p(r0, &(0x7f0000000040)="11", 0x1) [ 2388.893324][ T35] audit: type=1800 audit(1612431853.029:52373): pid=31403 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14289 res=0 errno=0 [ 2389.015700][ T35] audit: type=1800 audit(1612431853.149:52374): pid=31411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14287 res=0 errno=0 09:44:13 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000128, 0x4) 09:44:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000180)='.\x00', 0xc60000f2) open(&(0x7f0000000340)='./file0\x00', 0x1031c2, 0x0) 09:44:13 executing program 4: modify_ldt$read_default(0x2, &(0x7f0000000100)=""/155, 0x9b) 09:44:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f6, 0x4) 09:44:13 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000123, 0x4) 09:44:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012d, 0x4) 09:44:13 executing program 4: geteuid() syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x3, &(0x7f0000000400)=[{&(0x7f00000000c0)="687b503b6ac85c22850bb536", 0xc, 0xd08f}, {0x0, 0x0, 0x80000001}, {0x0, 0x0, 0x8}], 0x8042, &(0x7f0000002500)={[{@noinit_itable='noinit_itable'}, {@bsddf='bsddf'}], [{@uid_eq={'uid'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wg1\x00'}}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002640)={&(0x7f0000002600)='./file0\x00', 0x0, 0x8}, 0x10) 09:44:13 executing program 1: r0 = geteuid() syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x3, &(0x7f0000000400)=[{&(0x7f00000000c0)="687b503b6ac8", 0x6, 0xd08f}, {&(0x7f0000000500)}, {0x0, 0x0, 0x7fff}], 0x8042, &(0x7f0000002500)={[{@noinit_itable='noinit_itable'}, {@nouid32='nouid32'}, {@journal_path={'journal_path', 0x3d, './file0'}}, {@barrier_val={'barrier'}}, {@bsddf='bsddf'}], [{@hash='hash'}, {@uid_eq={'uid', 0x3d, r0}}, {@euid_gt={'euid>', 0xee01}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002640)={&(0x7f0000002600)='./file0\x00', 0x0, 0x8}, 0x10) 09:44:13 executing program 1: syz_open_dev$dri(&(0x7f0000000380)='/dev/dri/card#\x00', 0x0, 0x40) 09:44:13 executing program 4: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/timer_list\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x334, 0x0, 0x0) 09:44:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x28, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) 09:44:13 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:44:14 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000129, 0x4) 09:44:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, @remote}, 0x0, {0x2, 0x0, @private}, 'macvlan0\x00'}) 09:44:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x64, 0x0, 0x0, 0x700}]}) 09:44:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f7, 0x4) 09:44:14 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000124, 0x4) 09:44:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012e, 0x4) 09:44:14 executing program 4: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "22b94d", 0x38, 0x3a, 0x0, @local, @dev={0xfe, 0x80, [], 0xe}, {[@routing], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "ae396b", 0x0, 0x0, 0x0, @mcast2, @private2}}}}}}}, 0x0) 09:44:14 executing program 1: mount$fuseblk(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000001040)='fuseblk\x00', 0x0, &(0x7f00000031c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id'}}) 09:44:14 executing program 1: inotify_init1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x1, 0x83, 0x100000001}, 0x40) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 09:44:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x80, 0x4) 09:44:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000004cc0)=[{{0x0, 0x0, &(0x7f0000002740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 09:44:14 executing program 4: set_mempolicy(0x1, &(0x7f0000000000), 0xcaf) 09:44:14 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012a, 0x4) 09:44:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000002180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10160, 0x0) 09:44:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f8, 0x4) 09:44:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012f, 0x4) 09:44:14 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000125, 0x4) 09:44:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x2, 0x0, 0x0, 0x4}, 0x40) 09:44:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x5, &(0x7f00000002c0)=ANY=[@ANYRESHEX], &(0x7f0000000040)='GPL\x00', 0x0, 0x73, &(0x7f0000000080)=""/115, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000180), 0x10}, 0x49) 09:44:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0xc, &(0x7f0000000080)=0x80, 0x4) 09:44:15 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 09:44:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000001580)={0x2, 0x0, @loopback}, 0x10) 09:44:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000006000)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000016c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001b80)=[@rights={{0x10}}], 0x10}], 0x1, 0x0) 09:44:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0x25, &(0x7f0000000080)=0x4, 0x4) 09:44:15 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012b, 0x4) 09:44:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000130, 0x4) 09:44:15 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/time\x00') 09:44:15 executing program 4: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f00000041c0), 0x0, 0x0) execve(&(0x7f0000002880)='./file0\x00', 0x0, 0x0) 09:44:15 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000126, 0x4) 09:44:15 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f9, 0x4) 09:44:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000001c80)={0x0, 0x1, 0x6, @multicast}, 0x10) 09:44:15 executing program 4: fsmount(0xffffffffffffffff, 0x0, 0x16) 09:44:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004740)=ANY=[@ANYBLOB="10"], 0x10}, 0x0) 09:44:15 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="10000000011c01"], 0x10}}, 0x0) 09:44:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/softnet_stat\x00') read$FUSE(r0, 0x0, 0x0) 09:44:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000012c0)={0xa, 0x3, 0x0, 0x7}, 0x40) 09:44:16 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012c, 0x4) 09:44:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x101440, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5}, 0x40) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000900)='/dev/vcsu\x00', 0x0, 0x0) getdents64(r1, 0x0, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="68abbba3fb02eccbe42e65d3e0aed0b37eba9b57616592d6184eeb3ef01c1f63922e635a013a24698b1f9ec3379a7e4ed52e4916a23dc74089bb67f84fdc2be844072a16683a704a6614f63acd7e2c5f38bebd4109c6a55457f7a893c7f273c89469bc8cae946569ec78ddb93b8037f54629e684d842666f44b81f38547142ca72603979d230081d8eacdc096a6c83cf6d169be866ae9b60a5ac8ed3f72abedba21bc7c6b0f43ba7bccd7f1d11d6b120d4cbbb952c214b88214725388c164d34efde05fb935a3c7641e1d4afbc18600e54d23f71a65c02206af636937350562507c61d521828c68b91d1db87", 0xec, 0x1}, {&(0x7f0000000280)="3b1188e0d3bf5edceb887dc2bc3a866a55907e6d9b12581ab2fba4a06d76adba37c5499dc4faeeac94b32a83c8ab7a740701128b0ec173e2642a203d35311d2e8ae30fcdc5d532b62f", 0x49, 0x1}], 0x42080, &(0x7f0000000340)={[{@shortname_winnt='shortname=winnt'}, {@fat=@showexec='showexec'}, {@uni_xlate='uni_xlate=1'}], [{@uid_lt={'uid<'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000200)={0x0, 0x0, r2, 0x10001, 0x80000}) 09:44:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x2b, 0x0, 0x0) 09:44:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000131, 0x4) [ 2392.224721][ T35] kauditd_printk_skb: 14 callbacks suppressed [ 2392.224791][ T35] audit: type=1800 audit(1612431856.359:52389): pid=31548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:44:16 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000127, 0x4) 09:44:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fa, 0x4) 09:44:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x48, {0x2, 0x0, @local}, 'gre0\x00'}) [ 2392.345435][ T35] audit: type=1800 audit(1612431856.419:52390): pid=31549 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:44:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x0, 0x102, 0x0, 0x0) [ 2392.390666][ T35] audit: type=1800 audit(1612431856.509:52391): pid=31558 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:44:16 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsu\x00', 0x20001, 0x0) write$evdev(r0, 0x0, 0x0) 09:44:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}, {0x2, 0x4e21, @remote}, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x9803}) 09:44:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x18, 0x0, 0x0) 09:44:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0x1b, &(0x7f0000000080)=0x4, 0x4) [ 2392.965401][ T35] audit: type=1800 audit(1612431857.099:52392): pid=31569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14282 res=0 errno=0 [ 2393.008350][ T35] audit: type=1800 audit(1612431857.139:52393): pid=31574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14283 res=0 errno=0 09:44:17 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012d, 0x4) 09:44:17 executing program 1: syz_emit_ethernet(0xfdef, &(0x7f0000000140)=ANY=[@ANYBLOB="0180c200000000000000000086dd60774f4d000000000000000000000005000000ffac1414bb00000000000000000000ffff00000000846697"], 0x0) 09:44:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000132, 0x4) 09:44:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fb, 0x4) 09:44:17 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000128, 0x4) [ 2393.206387][ T35] audit: type=1800 audit(1612431857.339:52394): pid=31586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14301 res=0 errno=0 [ 2393.248816][ T35] audit: type=1800 audit(1612431857.369:52395): pid=31579 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:44:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0x25, &(0x7f0000000080)=0x80, 0x4) 09:44:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000780)=ANY=[@ANYBLOB="680000009dac59"], 0x68}}, 0x0) 09:44:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sysfs$1(0x1, &(0x7f0000000100)='fuse\x00') 09:44:17 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0xffffffffffffff18, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev}, 0x1c) 09:44:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file1\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)) 09:44:17 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000040)) 09:44:17 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) getdents64(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x9, 0x0, &(0x7f00000001c0), 0x42080, &(0x7f0000000340)={[{@shortname_winnt='shortname=winnt'}]}) [ 2393.825249][ T35] audit: type=1800 audit(1612431857.959:52396): pid=31601 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14288 res=0 errno=0 [ 2393.969907][ T35] audit: type=1800 audit(1612431858.109:52397): pid=31599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14287 res=0 errno=0 09:44:18 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012e, 0x4) 09:44:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000001cc0)={0x0, {}, {0x2, 0x0, @empty}, {0x2, 0x0, @broadcast}}) 09:44:18 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept$alg(r0, 0x0, 0x0) 09:44:18 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fc, 0x4) 09:44:18 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000129, 0x4) 09:44:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000133, 0x4) [ 2394.062367][ T35] audit: type=1800 audit(1612431858.199:52398): pid=31607 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:44:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @private}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 09:44:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0xa, &(0x7f0000000000)="a9", 0x1) 09:44:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x29, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) 09:44:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @private}, {0x304, @broadcast}, 0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 09:44:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x7, 0xc9ba, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) 09:44:18 executing program 1: sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, 0x0, 0xa1b0ba9fdf2b4a93) 09:44:19 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012f, 0x4) 09:44:19 executing program 4: syz_emit_ethernet(0x11, &(0x7f0000000140)={@remote, @multicast, @void, {@llc={0x4, {@llc={0x0, 0x0, "ba"}}}}}, 0x0) 09:44:19 executing program 1: msgsnd(0x0, &(0x7f0000000000)=ANY=[], 0xfd1, 0x0) 09:44:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fd, 0x4) 09:44:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000134, 0x4) 09:44:19 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012a, 0x4) 09:44:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 09:44:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x3, 0x0, &(0x7f0000000080)) 09:44:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000047c0)={&(0x7f0000004640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2, 0x9}]}]}}, &(0x7f00000046c0)=""/208, 0x32, 0xd0, 0x1}, 0x20) 09:44:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x14, 0x0, 0x0) 09:44:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000340)=[{0xffffffffffffffff}], 0x1}, 0x0) 09:44:19 executing program 4: shmget$private(0x0, 0x2000, 0x78000909, &(0x7f0000ffb000/0x2000)=nil) 09:44:19 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000130, 0x4) 09:44:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240), 0x7a) 09:44:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 09:44:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000135, 0x4) 09:44:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fe, 0x4) 09:44:19 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012b, 0x4) 09:44:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x42, 0x0, &(0x7f0000000080)) 09:44:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic-generic\x00'}, 0x58) 09:44:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000100), 0x4) 09:44:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6}]}) 09:44:20 executing program 1: execveat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 09:44:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x0, 0x0, 0x0, 0x40}, 0x40) 09:44:20 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000131, 0x4) 09:44:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth0_virt_wifi\x00', &(0x7f0000000000)=@ethtool_rxfh={0x46, 0x0, 0x0, 0x0, 0x0, "f7bd9a"}}) 09:44:20 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x101440, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000240), 0x40) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000900)='/dev/vcsu\x00', 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x42080, &(0x7f0000000340)={[{@shortname_winnt='shortname=winnt'}, {@fat=@showexec='showexec'}, {@uni_xlate='uni_xlate=1'}], [{@uid_lt={'uid<'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}]}) 09:44:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000102, 0x4) 09:44:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000136, 0x4) 09:44:20 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012c, 0x4) 09:44:20 executing program 4: waitid(0x4a989f72b94b744, 0x0, 0x0, 0x2, 0x0) 09:44:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$KVM_SET_PIT(r4, 0x4010ae67, &(0x7f0000000240)) 09:44:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000047c0)={&(0x7f0000004640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0xe}]}]}}, &(0x7f00000046c0)=""/208, 0x32, 0xd0, 0x1}, 0x20) 09:44:20 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@private}}, &(0x7f00000004c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000500)={@multicast1, @loopback, r0}, 0xc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x5, &(0x7f0000000000)="a9", 0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xff}}, {0x2, 0x4e21, @remote}, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x9803}) r2 = accept$inet(r1, &(0x7f0000000200)={0x2, 0x0, @dev}, &(0x7f0000000240)=0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000340)={'syztnl2\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='gretap0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00087800000000510000000775106dfa00680000402f90787f0000019d67b2e00000018907edac141442891b4b0000000000000000e00000deb92ce602ac1414bb7f00000194040000444461bc727114aa00000009ac1e010100000002ac1414bb00000006ac1414aa00000009ac1414aa00000009e000000200000200ac14143e00000003ffffffff000000"]}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r3, 0x0, 0xc, &(0x7f0000002140)=0x5, 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000380)={0x0, 'veth0_to_bond\x00', 0x1}, 0x18) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x880000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x800, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004050}, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r5, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0xa8, 0x0, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x54, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private1={0xfc, 0x1, [], 0x1}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r0}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r0}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010100}]}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xff}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000}, 0x20040846) r6 = accept4(r3, 0x0, &(0x7f00000006c0), 0x80000) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=@gettclass={0x24, 0x2a, 0x400, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r0, {0x1, 0x5}, {0xffe0, 0x6}, {0xfff2, 0xc}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40c0}, 0x24005055) 09:44:20 executing program 4: r0 = getpgid(0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 09:44:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000400)=0xc) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x2811fdff) [ 2397.260941][ T35] kauditd_printk_skb: 14 callbacks suppressed [ 2397.260951][ T35] audit: type=1800 audit(1612431861.400:52413): pid=31724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 [ 2397.314058][ T35] audit: type=1800 audit(1612431861.430:52414): pid=31725 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2397.365780][ T35] audit: type=1800 audit(1612431861.500:52415): pid=31728 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:44:21 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000132, 0x4) 09:44:21 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void, @void}}}, 0x1c}}, 0x48) 09:44:21 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x101440, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5}, 0x40) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000900)='/dev/vcsu\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000200)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x80000}) 09:44:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000137, 0x4) 09:44:21 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000103, 0x4) 09:44:21 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012d, 0x4) [ 2397.450176][ T35] audit: type=1800 audit(1612431861.590:52416): pid=31739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:44:21 executing program 4: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "22b94d", 0x30, 0x3a, 0x0, @local, @dev, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "ae396b", 0x0, 0x0, 0x0, @mcast2, @private2}}}}}}}, 0x0) 09:44:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000180)="b8050000000f01c10f46a78900000066ba2100b067ee4066ba2000b000eeedb9800000c00f3266bac0000f3066b808008ed0660f38806f000f011c26f5f30fc7b2533b0000", 0x45}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000500)={0x0, 0x0, @pic={0x0, 0x1}}) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000240)={{}, {}, 0x0, 0x0, 0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0xfffffffffffffd8c, 0x0, 0x0}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/l2cap\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:44:21 executing program 4: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') execve(&(0x7f0000002880)='./file0\x00', 0x0, &(0x7f0000002c00)=[&(0x7f0000002a40)='data=journal', 0x0, &(0x7f0000002b40)='fsuuid', 0x0]) 09:44:21 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000dfd000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x10000000) [ 2397.682640][T31784] kvm: pic: non byte read [ 2397.699643][T31784] kvm: pic: level sensitive irq not supported [ 2397.699682][T31784] kvm: pic: non byte read 09:44:21 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000000)={'vlan1\x00', @ifru_names}) [ 2397.751442][T31784] kvm: pic: level sensitive irq not supported [ 2397.751477][T31784] kvm: pic: non byte read [ 2397.790920][T31784] kvm: pic: level sensitive irq not supported [ 2397.790955][T31784] kvm: pic: non byte read [ 2397.837232][T31784] kvm: pic: level sensitive irq not supported [ 2397.837345][T31784] kvm: pic: non byte read 09:44:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x9, &(0x7f0000000300)) [ 2397.882141][T31784] kvm: pic: level sensitive irq not supported [ 2397.882185][T31784] kvm: pic: non byte read [ 2397.922280][T31784] kvm: pic: level sensitive irq not supported [ 2397.922321][T31784] kvm: pic: non byte read [ 2397.948008][T31784] kvm: pic: level sensitive irq not supported [ 2397.948043][T31784] kvm: pic: non byte read [ 2397.981748][T31784] kvm: pic: level sensitive irq not supported [ 2397.981846][T31784] kvm: pic: non byte read [ 2398.009063][T31784] kvm: pic: level sensitive irq not supported [ 2398.013260][T31784] kvm: pic: non byte read [ 2398.030857][T31784] kvm: pic: level sensitive irq not supported [ 2398.268004][ T35] audit: type=1800 audit(1612431862.400:52417): pid=31767 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14281 res=0 errno=0 [ 2398.341092][ T35] audit: type=1800 audit(1612431862.460:52418): pid=31776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:44:22 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000133, 0x4) 09:44:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0x6, &(0x7f0000000080), 0x4) 09:44:22 executing program 1: r0 = socket(0x10, 0x802, 0x0) setsockopt$inet_int(r0, 0x6, 0x0, 0x0, 0x0) 09:44:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000104, 0x4) 09:44:22 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012e, 0x4) 09:44:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000138, 0x4) 09:44:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0xb, &(0x7f0000000000)="a9", 0x1) [ 2398.446422][ T35] audit: type=1800 audit(1612431862.580:52419): pid=31786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14282 res=0 errno=0 09:44:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 09:44:22 executing program 1: r0 = inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x7) 09:44:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb}, 0x40) 09:44:22 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x1f]}, 0x8}) 09:44:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3}, 0x40) [ 2399.116773][ T35] audit: type=1800 audit(1612431863.250:52420): pid=31812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14289 res=0 errno=0 [ 2399.192028][ T35] audit: type=1800 audit(1612431863.330:52421): pid=31818 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14287 res=0 errno=0 [ 2399.246215][ T35] audit: type=1800 audit(1612431863.360:52422): pid=31814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:44:23 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000134, 0x4) 09:44:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x7, 0xc9ba}, 0x40) 09:44:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000180)=""/169, 0x1a, 0xa9}, 0x20) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaad2f, &(0x7f00000001c0)=[{&(0x7f0000000100)="01db4945d0b4687fea79846af909f9be09d3e6050c706265be13dc86b31bd05579065ef162b5cf68240bf19f08fc84827fdf2a22fd7fdf4d095edf1c25f0ba40a2f3861e1d5f08141f65b860e4d9fc7d6f95dc0b9c0f6f80efd88e1c56e5718ec70c4153d1628bffe1c29b0f3a20c589988a685bce26943885bdd14eaa10a989f4c8d34dd91d7a746a68ea798e2d8b99ae2e81879982b51582ba83f48c3a0e71d58604aab7d2b73fa60a5f2fb9c6c1bf19c2156a83f3", 0xb6, 0xff}], 0x400, &(0x7f00000002c0)={[{@utf8='utf8=1'}, {@utf8no='utf8=0'}, {@uni_xlate='uni_xlate=1'}, {@utf8no='utf8=0'}], [{@fowner_gt={'fowner>'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, '(\\-.:^%'}}, {@uid_eq={'uid'}}, {@fowner_gt={'fowner>'}}]}) 09:44:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000105, 0x4) 09:44:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000139, 0x4) 09:44:23 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012f, 0x4) 09:44:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xa, 0x0, &(0x7f0000000080)) 09:44:23 executing program 1: set_mempolicy(0x0, &(0x7f00000000c0), 0x8001) 09:44:23 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x1401, 0x1}, 0x10}}, 0x0) 09:44:23 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x24}, {0x6}]}) 09:44:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xb, 0x0, 0x0, 0x3}, 0x40) 09:44:24 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mounts\x00') 09:44:24 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000135, 0x4) 09:44:24 executing program 1: syz_emit_ethernet(0x7a, &(0x7f00000025c0)={@link_local, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "843c16", 0x44, 0x2f, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev}}}}, 0x0) 09:44:24 executing program 4: syz_emit_ethernet(0xfdef, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c276f45d93cfb18b520086dd606f4f4d0000d8"], 0x0) 09:44:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000106, 0x4) 09:44:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013a, 0x4) 09:44:24 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000130, 0x4) 09:44:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000047c0)={&(0x7f0000004640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1}]}}, &(0x7f00000046c0)=""/208, 0x26, 0xd0, 0x1}, 0x20) 09:44:24 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='.\x00'}, 0x10) 09:44:24 executing program 1: syz_emit_ethernet(0x330, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c200000000000000000086dd60774f4d02fa00002001000000000000000000000000000000000000000000000000ffff00000000000001"], 0x0) 09:44:24 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000100)={0x18}, 0x18}}, 0x0) 09:44:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x18, 0x0, &(0x7f0000000080)) 09:44:24 executing program 1: fsopen(&(0x7f0000003f00)='bpf\x00', 0x0) 09:44:25 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000136, 0x4) 09:44:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x6, 0x0, 0x0) 09:44:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x0, @loopback}, {}, 0x52, {0x2, 0x0, @multicast2}, 'veth1_to_bridge\x00'}) 09:44:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000107, 0x4) 09:44:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013b, 0x4) 09:44:25 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000131, 0x4) 09:44:25 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local, @empty, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @empty, "75605b77d837c79b"}}}}, 0x0) 09:44:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x802, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x10000000) 09:44:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)) 09:44:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0xc, &(0x7f0000000080), 0x4) 09:44:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x6, 0x16, &(0x7f0000000080), 0x4) 09:44:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) 09:44:25 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000137, 0x4) 09:44:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003480)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0xf}, 0x0) 09:44:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:44:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013c, 0x4) 09:44:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000108, 0x4) 09:44:25 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000132, 0x4) 09:44:26 executing program 4: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x82132, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0xac1, &(0x7f0000000040), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 09:44:26 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000f80)={0x24, r0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}}, 0x0) 09:44:26 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:44:26 executing program 1: mmap$IORING_OFF_SQES(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x0, 0x8164171, 0xffffffffffffffff, 0x10000000) 09:44:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x4b67, &(0x7f0000000040)) 09:44:26 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x4b45, 0x0) [ 2402.346462][ T35] kauditd_printk_skb: 14 callbacks suppressed [ 2402.346473][ T35] audit: type=1800 audit(1612431866.480:52437): pid=31932 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14294 res=0 errno=0 [ 2402.442488][ T35] audit: type=1800 audit(1612431866.580:52438): pid=31935 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:44:26 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000138, 0x4) 09:44:26 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000000280)=ANY=[@ANYBLOB="0001000012000100000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000429ab99f72638b5c6c9f3955cc2da839341152be1c107922b7"], 0x100}}, 0x0) 09:44:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f0000000240)=""/143, 0x26, 0x8f, 0x1}, 0x20) 09:44:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000109, 0x4) 09:44:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013d, 0x4) 09:44:26 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000133, 0x4) [ 2402.637107][ T35] audit: type=1800 audit(1612431866.770:52439): pid=31941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2402.659641][ T35] audit: type=1800 audit(1612431866.780:52440): pid=31949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:44:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f00000034c0)={0x0, 0x0, &(0x7f00000031c0)=[{&(0x7f0000000b00)={0xeb4, 0x0, 0x0, 0x0, 0x0, "", [@nested={0xea1, 0x0, 0x0, 0x1, [@generic="8b28e95f6c94a8e55f86e78d58a397e72c65595e09cf14866199115b759d064d78b221f0544e0103dccd1cdf283a181bc728fd09e2a3e589e93c452737d5387bbc27d4a0a2b79df2bd9e00ab3b98ded7cd00ddd85bbabd31c7d48609bfe5e54abc9f21900746f451007191ebab6cd51a88e626241a60ab4a1fdd51f78b5303fd300813e50341c794c30b5d1b49b099bc9df23b2ae6310a4b", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="014febbaaa80fac6bfd6e852175ccc503614e69025ea9873f77e97859c5a50f24fe03c20063882c82236ed48c460a2282489729974c4f90435c0acffcd8a32bb30d35adefad1a035c9f64727ab49ce75cfc6c574fd4a3eba88952809bfd687c83ca4a5cf1ee011340136b1cf1333a01c13be90f1c4cffa43f699afe600b824a4739d35e810fed11d77bca4cef72af2248ef01be3a1f6ee4fa791af6bf561b469dfbe6825d74b81ff54f13211f7f427167d741552b355f31ef359abd23b9b75615686fd577afd30eba289a14bbbb89b0f8243801d8b97950e5c7cb022cbcf386fcc66932d6ac4f1dab67a62d685c8a7c04a3f5587238827fb3e265bf4dc9004c8d537331de278b3046f3049582d4d7ed3a2c5a2263a41ee564bd614189e66e1d2480211ee4efdb156dd4ff911fdd57b018094f7caa05790eafbdde6c051366ddb3009575fed09ab8cccabbe40ce39f84b0e6055f27954fcce38bc88bc65a2dd4c75348655ae6873a9cbac9871fe3b8960b7e5f8bc6292b4471f6d2df492131d1172e50a58e1e661d6670c29f4f28413bf84966f32e8a3102b72e0c9edf13162da1235ec884901c5c546e97cffeafdb874c5f23d27a60406c35e2393d4c5689c118ce752bd28ddece183ba7c110054bb0f990e8ee743943325fbad756e239696f26ec9f23ce1f40c1d72f9b2562a529def6363e896a20f464d1cc1450d117533c18323e9efd093a6451a809a8679021d6f64dc8d522b660f6852b136481ffc41f304bc25d15d7a23455c4eb98e269216293240e02b68c6ce2c6567ed55b95694b240d1516d9ef1125f06c62178f3df20454223804ba6b75955a720b6e8af7a67fa9bfa1aff73731bbba5200fa01832f313615cc4ac4046dc6a28633134cb4e2dd841f306fef5e45bd77d0cb6f255343b429be57e7f1cdaea9696130bf77e243f4492df74690488d9d922ba087437bfa731a1d7a9ead388bb4e5b6ef33bd671c5f4186ac25b08b83907f910f2a7076584afd01dd9168d2320e37a33a17dca24f92fadcff79ee614b1aae2a07b6c9915bb25e28aad9433d043b4ae2165a7b8debc7daecc88c0e1240f9a3e4fd33d02398bb13599769c45c4b19a9fc552d622ef6373f56134074f5c52b2f2f3fcf100bb0cc43685dab168f3887fc10c70855d5e02e290c66d4aef5aa185a6c83e731e6117dff1965974f6c6ec518561bafd08f8a7f57c754063c45abcc986f079e3362d4d09c03d20554161c96691b939ad06fa043b16724a12a9f29db9ba21742e09474fae6d38bea65585cf57b564cd0828c30f6c4bf3456c89c867b7425454da3077704ea4e8d1eebe00571296aa766e17150c1d65282d5752463287faf3e0f1765fd27dda102724eebd005875260584bb2577f794db75bafdeefa88efa4279402dde47ec51d01df42f640248bab8e6c9efbf0ce5acf13f796f8958a9d2b214fa470538170ebf42fc5e8e76ebdd22399a59e4a189988579f7931a635551bd7522bddfffd828349789b83814e5f68621f8797ad7b8e29c1bca57510fa7873639ad8fa4d6546785c105a35a7bd47ecd54fe852229b02da8529089d0c06d120e8330025670cd209c86ccad3c20e7abc3898e0772152c6e60f7dcf64a626b54b475f401d23367bf69db2d9781e0221a7772d849ef99080bea55c9768e4d51dd6dcc0e74808528fcc3feb24e21e0ed7f83d045497720b48bee74462dabbfc32a54b8fa00a286d792ad46d9e2eb15aea2b27ac40a4381370e00f1c0949957e652b185ab9f76713dc135a9295e884909cfb9ba6b84121765d3a8705681cd062de941fc52c452d92a604b9e7805146f1f89167f7c06a656bec3247fde8feefe07eb0792aff294d1a36729fe4c39a142068f798a277240daccc7922308d4c2e64eedad4fc3543bc90053cbef48ce929bf1cdd1a1b799478fc32cf383e3469d0e50c1a29d788740358347977caeeba37abcc24f60a2364995d6e071117c81c85b50277ad3953ec3c57d7a197787057e4673326d1a5be42ffb3fce9418d0c7bfdc4ca5f1b958e9c7deb26d9329c2284ba6a37d8d4e5b88e3e84c7d02f0345e0aca4ff50dc7332a2a13249691429a52c414db56b53518aa5453fdfc43d7d5f3be86b7c5f5931f38f52a54b2e8665a2d9a14ae23233411ec963b2062180e35afc9fc7e5f0d5cb1d2990c55e2e294505c02e670d550236da386293bad35b0c2db2d941e4d982de5792e73f7c145636bae85764078334344f7620e2f5ab2d9cd2bd2304c58f8b9a7f5ba3d3c9cd596527cd71b90f7c4773f72611165f183354ed2273c7ea3d2dbf8ccc16e8e726fffd271bd78db830b4ce76d38d9de08b18f1fb94ef8dc6a47722e822611be1b87fac9a496be51d659735d00167cb81985d3cee81525ddb96c1a9a00ca8462c59f99bc2b43845b09faf04e7b13780c6ab033a392e8b8b8a1f0cd40b209b118e903cfad708ef266037e9bceb53f4681858e6e38e4c52f699fdca936eaedcc0357d7717f67e3d0913f38ddecfed20d263f18a1ece87aebe21bef31a8a261bf27f450da4c6780b76bf23f42a638f35d88446738b20c1bc600c58e5a34003a5dcbd8e41fa3adf0cc46d0c85c2828fa6581f8b31607f5066bd8f20ddee2bb78afdf6503dc284574ebfff603544dca1d2000d51d3c281f7304f4e2f4273b825b8b71a18ffb4a634136c585235ed2af138031a2f23e7fc16fc553e315ab3f7c3edc30f7f6fdb8c10b557855f46ef47f6ce2e9504e80df9c9ae59bff261cc788c916d073f8dea2617406f3bf5b23b3d1808da1565982e0493994560d9773878eb096cf93d76f1f471d957b0812a2f39a47e09189fa704175cbef29e0e713ca928aacb09b0d0573a72b3851d6aa288d56e62d8a9770a8492f34208692e891c7b4dd946ac958dada288f1e697f5a4aca9c8abe3c2ae495284731c0ac79c9726cc05c27e41987018b8610e72cc60aa6f48864385a0fb0ca135234a8823c63d7952d534f187a6f1d339209a48efc361fcb78f6a901e763498be231f33b0d52c536e6c67312e3797d982b05f3da450661cac1bb8728b76242d668075f745db308c801131b4177165decf547b04d87366aa2918a6e36e3c1c4298af157ae711fac64beac998fcee690fda6a83bdd5076559f38aa3f0863b947a0c99df2bac68b53e085400ef001462bf4adc20527514a8ed0b0588e9f7122f7186e3ffa0fb27a413519bc060c1984b424e8241db573543413e10f32c6467ecbfd88dd08f1cde1342957eb48e32a312cd38cb38f3a8183271cdb3cd9ff2b0d0c6db2d147c06a4caafcc44da3973ffa9205b74997d42b058837ac16edbd7287cfe640a58a76f97f3191d244778021712021f732c5d7cb1a50d6772a798e212c4bf5be7dfbc07e3deeb22d381e9d62b1afb10c99ade57a5ff90e3a345ec78a2c2b79a3e116b9589f3a72052f77601cd705f0c7344e204cb9eb21c276a504048d1e42e36110b24b6619262b4159c33acffa19ae66e14db1d55d7671dead6eacfb0eb070abad1ed177b1e7fac41be0985ef3aae1f06387de256df3040571b1e24fb5fd646315f84d0c7a0b1f8c8986967edbb823b3b84ff4216eb0920c95564aaa5450bfcdb01cdb902bccecf7efa6cf15113d719fc0b85ce19515b9d58caf3cbd11760d21099cc1f51aa5cd61fc7dd68a2c538b585c4fe30d304544b4ef3d81b04c07d1966388bb3ed01ab258c778ba880b771189075111120c98780fdf0f00d9ba5f6627b968c05cd215a40b9542e70bf66484cce77b1ac8f87b4cdb64498207e9f6e2dd4617aefcccb96a5228785e8ba7a18a9b0ddcc3ff93b2d63d798720d6ea68257fc68a94144f1875118f1f6321c0a05c97f01ce86b21821cc4534136745bdc4b91a1eea0870c444cf4f190d81a9339b66475f215334283a381fcd342eb356ba24174c14ad6fd7f161f56f8c8302cbb3524b0ad2ea7bf1b858dc37d586aa856a97b62295fa0861d5d2b9c543cdba80b08ebab1093313f54772c00436006c5dadb644a9743a0d21a55c8c58de568b1bf3812486ad750d5cb0e5c017d90cda28a9375581eca243259f14ab108c245e5242bff5be6dcef52b129f51f1df7867584441a7ac532554b5473c0e309402dad3702f5523afbe769bd427e0ab04fe369a945dc9d41b7b5b5bcc8f072a444140da1307aa1612d372468c0480f9b001e61f8570512074c058176074dcdaaf84108e19afb579194f4eac642feafb03bbf277f2e58587e4ac72d5eca3b51b602d6255875f9872c3e998536789bbc7bbd0384472acd2dde915fa557a32ae209aa58ec0caff061b17b3608bfe5bb236b75d683002c55d6fc1337ddda5cef50fe4d427446cd9ac913febd1707fc0a9a395f4b9c18b6a60a7c9845192a28830c98a253a1a7db3efc28bca193d62fd77ab7ddab6626225e0a8577415bf55797e297ec6c75c63e4bb55c3038d4d4569690fba326a694f1dc1c3786f8bc4fb909abde3308b3e72414d2c7b6d76b052a00602fb66193ba581c822430069d371f3eebd14a6c36e4f1921c705ef7fb0a71b82e0454801bdf47a4035ca00d41e6b197c0ba130b8583816e56232958ae0975d65cce84b2a06f19445417ee770a8ec1d83186bc3223ac3c05d3633733427a3a2e84e3bdecdd0835cc113618fb42ff8891141af764b51ed23899e1ce25127b852ca202e084b1018c667af5d5ca4e7dd174da968d3676ef981c62cf6744c9eaaea0208772992ecfe87f89699afaf153fced9b7243e275428d2c981fafeac8bcac15564f73d7cf53e95ff0370fba10a9e586c032f7fa669b4ad30b392d266cd1731b053af294c32f41907514fcb65631fff2eaddd74b21af809cfcaf68b65d336bb95d0bd4f8e38f5b7ebc167888f1c0cdff9e45987810dbcc9077597515c1ab9320ac8c9eece6da5a49a0e6949141fc4522b0f05a39b437cea38ad04bf2ce7bebc0b5b830989fd9ae0c33988864ad11ca68df9cfc31e9a3546b8f400f58244d0cdc98817a15db6978d9578b28fcf01b6aacc2c8f7cb9e0d82e72d3e6d3d64134"]}]}, 0xeb4}, {&(0x7f0000001f00)={0x10}, 0x10}], 0x2, &(0x7f0000003480)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01}}}, @cred={{0x1c}}], 0x30}, 0x0) 09:44:26 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:44:26 executing program 4: r0 = gettid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:44:26 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000040)) ioctl$TIOCGSOFTCAR(r0, 0x4b61, &(0x7f0000000000)) 09:44:27 executing program 4: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x82132, 0xffffffffffffffff, 0x8000000) 09:44:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@struct={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000000c0)=""/154, 0x2a, 0x9a, 0x1}, 0x20) [ 2403.359873][ T35] audit: type=1800 audit(1612431867.500:52441): pid=31968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14294 res=0 errno=0 [ 2403.442556][ T35] audit: type=1800 audit(1612431867.570:52442): pid=31967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:44:27 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000139, 0x4) 09:44:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x402c542b, &(0x7f0000000000)) 09:44:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00'}) 09:44:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010a, 0x4) 09:44:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013e, 0x4) 09:44:27 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000134, 0x4) [ 2403.474404][ T35] audit: type=1800 audit(1612431867.600:52443): pid=31980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14280 res=0 errno=0 [ 2403.505083][ T35] audit: type=1800 audit(1612431867.610:52444): pid=31981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14283 res=0 errno=0 09:44:27 executing program 1: shmget$private(0x0, 0x2000, 0x810, &(0x7f0000ffd000/0x2000)=nil) 09:44:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x4b4d, &(0x7f0000000040)) 09:44:27 executing program 1: r0 = io_uring_setup(0x3200, &(0x7f0000000000)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000001, 0x11, r0, 0x8000000) 09:44:27 executing program 4: prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000ffc000/0x4000)=nil) 09:44:27 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x7, 0x0, "545d658e524687d709439e262f47517268bcd1"}) 09:44:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x4b69, &(0x7f0000000040)) [ 2404.031838][ T35] audit: type=1800 audit(1612431868.170:52445): pid=31999 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14292 res=0 errno=0 [ 2404.228444][ T35] audit: type=1800 audit(1612431868.370:52446): pid=32002 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14278 res=0 errno=0 09:44:28 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013a, 0x4) 09:44:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:44:28 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x7, 0x0, "545d658e524687d709439e262f47517268bcd1"}) 09:44:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010b, 0x4) 09:44:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013f, 0x4) 09:44:28 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000135, 0x4) 09:44:28 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x5}, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={[0xaa3]}, 0x8}) 09:44:28 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x7, 0x0, "545d658e524687d709439e262f47517268bcd1"}) 09:44:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x5441, 0x0) 09:44:28 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x7, 0x0, "545d658e524687d709439e262f47517268bcd1"}) 09:44:28 executing program 4: io_setup(0x5, &(0x7f0000000000)) io_setup(0x1, &(0x7f0000000040)) 09:44:28 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5403, &(0x7f0000000000)) 09:44:29 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013b, 0x4) 09:44:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x4b64, &(0x7f0000000040)) 09:44:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x5605, 0x0) 09:44:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000140, 0x4) 09:44:29 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000136, 0x4) 09:44:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010c, 0x4) 09:44:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000300)=@ccm_128={{}, "99300c84b16d64b5", "1a1e9007d17b74b6d5cf8f25700882a4", "933fb979", "199a7970e95636ed"}, 0x28) 09:44:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = gettid() r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000200)) 09:44:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x5609, &(0x7f0000000040)) 09:44:29 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x9}]}) 09:44:29 executing program 4: syz_io_uring_setup(0x6293, &(0x7f0000000440), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000300), 0x0) syz_io_uring_setup(0x5139, &(0x7f0000000380), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000400), 0x0) 09:44:29 executing program 1: r0 = epoll_create(0x3) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) 09:44:30 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013c, 0x4) 09:44:30 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000000100)={0x50, 0x12, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4, 0x3}]}, 0x50}}, 0x0) 09:44:30 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001680)={&(0x7f0000000080), 0x2000008c, &(0x7f0000001640)={&(0x7f0000000100)={0x54, 0x12, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) 09:44:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010d, 0x4) 09:44:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000141, 0x4) 09:44:30 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000137, 0x4) 09:44:30 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x3, 0xcf, &(0x7f0000000080)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:44:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000180)=@raw=[@exit, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @alu={0x7}, @ldst={0x5}, @exit, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000200)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000540)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:44:30 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x540b, 0x0) 09:44:30 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000400)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x70) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x34788, 0x0) 09:44:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:44:30 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:44:30 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013d, 0x4) 09:44:30 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000000100)={0x4c, 0x13, 0x1}, 0x4c}}, 0x0) 09:44:30 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000138, 0x4) 09:44:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010e, 0x4) 09:44:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000142, 0x4) 09:44:31 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:44:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0xc01047d0, &(0x7f0000000040)) 09:44:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x5424, &(0x7f0000000040)) 09:44:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x5414, &(0x7f0000000040)) 09:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4}, {0x10}, {0xc, 0x1}]}]}}, &(0x7f00000001c0)=""/246, 0x3e, 0xf6, 0x1}, 0x20) 09:44:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000040)) ioctl$TIOCGSOFTCAR(r0, 0x4bfa, &(0x7f0000000000)) 09:44:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x40049409, &(0x7f0000000040)) [ 2407.494184][ T35] kauditd_printk_skb: 14 callbacks suppressed [ 2407.494195][ T35] audit: type=1800 audit(1612431871.631:52461): pid=32139 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:44:31 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013e, 0x4) 09:44:31 executing program 4: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg2\x00'}) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000400)) [ 2407.557946][ T35] audit: type=1800 audit(1612431871.681:52462): pid=32146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:44:31 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000139, 0x4) 09:44:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010f, 0x4) 09:44:31 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x5607, 0x0) 09:44:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000143, 0x4) [ 2407.607345][ T35] audit: type=1800 audit(1612431871.691:52463): pid=32138 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:44:31 executing program 4: clock_gettime(0xd0ae308da4591193, 0x0) 09:44:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:44:31 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x2032, 0xffffffffffffffff, 0x10000000) syz_io_uring_setup(0x5139, &(0x7f0000000380), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, 0x0, 0x0) [ 2407.693625][ T35] audit: type=1800 audit(1612431871.751:52464): pid=32136 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:44:31 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000700)='/dev/bsg\x00', 0x0, 0x0) io_uring_setup(0x16cd, &(0x7f0000000280)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}) 09:44:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) 09:44:32 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2408.330112][ T35] audit: type=1800 audit(1612431872.471:52465): pid=32170 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14287 res=0 errno=0 [ 2408.377834][ T35] audit: type=1800 audit(1612431872.501:52466): pid=32176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:44:32 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013f, 0x4) 09:44:32 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, 0x0) 09:44:32 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013a, 0x4) 09:44:32 executing program 1: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) 09:44:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000110, 0x4) 09:44:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000144, 0x4) 09:44:32 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, 0x0) [ 2408.469970][ T35] audit: type=1800 audit(1612431872.611:52467): pid=32175 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14274 res=0 errno=0 [ 2408.497263][ T35] audit: type=1800 audit(1612431872.611:52468): pid=32182 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:44:32 executing program 1: name_to_handle_at(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x1000) 09:44:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@mpls_getroute={0x1c, 0x1a, 0x501}, 0x1c}}, 0x0) 09:44:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_UID={0x8}]}, 0x24}}, 0x0) 09:44:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)=@ipv6_getroute={0x28, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_METRICS={0x4}, @RTA_IIF={0x8}]}, 0x28}}, 0x0) 09:44:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x5, 0xffffffffffffffff, 0xf) [ 2409.057169][ T35] audit: type=1800 audit(1612431873.191:52469): pid=32203 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14281 res=0 errno=0 [ 2409.190619][ T35] audit: type=1800 audit(1612431873.331:52470): pid=32204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14278 res=0 errno=0 09:44:33 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000140, 0x4) 09:44:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=@ipv6_getroute={0x24, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_OIF={0x8}]}, 0x24}}, 0x0) 09:44:33 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013b, 0x4) 09:44:33 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x101280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 09:44:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000111, 0x4) 09:44:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000145, 0x4) 09:44:33 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) 09:44:33 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x101280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 09:44:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14, 0x0, 0x321}, 0x14}}, 0x0) 09:44:33 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x101280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 09:44:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 09:44:33 executing program 1: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x101280, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 09:44:34 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000141, 0x4) 09:44:34 executing program 4: open$dir(&(0x7f00000000c0)='./file1\x00', 0x80040, 0x0) open$dir(&(0x7f0000000f40)='./file1\x00', 0x48000, 0x0) 09:44:34 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) socket$inet_udp(0x2, 0x2, 0x0) unshare(0x20000) 09:44:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000112, 0x4) 09:44:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000146, 0x4) 09:44:34 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013c, 0x4) 09:44:34 executing program 4: symlinkat(&(0x7f0000001e00)='./file0\x00', 0xffffffffffffffff, 0x0) 09:44:34 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000001b80)='./file0/file0\x00', 0x0, 0x0) 09:44:34 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', &(0x7f0000000000)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000001200)={0x0, "e15b5f521994cc012b4aab9227c3fbffffffb60778ba0af4bbb11a4b5050cb0100864387309b3cadf5df7a2e99112e4b00"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) keyctl$revoke(0x3, r0) 09:44:34 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1a1000, 0x0) 09:44:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:44:34 executing program 4: quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0xee01, 0x0) 09:44:35 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000142, 0x4) 09:44:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)=@mpls_getnetconf={0x14, 0x52, 0x205}, 0x14}}, 0x0) 09:44:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000800)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x5}]}, 0x28}}, 0x0) 09:44:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000113, 0x4) 09:44:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000147, 0x4) 09:44:35 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013d, 0x4) 09:44:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)=@mpls_getnetconf={0x14, 0x52, 0x205}, 0x14}}, 0x0) 09:44:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)=@mpls_getnetconf={0x14, 0x52, 0x205}, 0x14}}, 0x0) 09:44:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'virt_wifi0\x00'}]}, 0x34}}, 0x0) 09:44:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)=@mpls_getnetconf={0x14, 0x52, 0x205}, 0x14}}, 0x0) 09:44:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv4_newaddr={0x2c, 0x14, 0x1, 0x0, 0x0, {}, [@IFA_LABEL={0x14, 0x3, 'ip6_vti0\x00'}]}, 0x2c}}, 0x0) 09:44:35 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 09:44:35 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000143, 0x4) 09:44:35 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x20000001, 0x0, 0x0) 09:44:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEAUTHENTICATE(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}}, 0x0) 09:44:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000148, 0x4) 09:44:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000114, 0x4) 09:44:36 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013e, 0x4) 09:44:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@getae={0x4c, 0x1f, 0x121, 0x0, 0x0, {{@in=@empty}, @in=@loopback}, [@mark={0xc}]}, 0x4c}}, 0x0) 09:44:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, ["", "", ""]}, 0x35}}, 0x0) 09:44:36 executing program 4: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000000)={{0x2, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01}}) 09:44:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEAUTHENTICATE(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}}, 0x40) 09:44:36 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x800, 0xae6) 09:44:36 executing program 1: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 09:44:36 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000144, 0x4) 09:44:36 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file1\x00'}, 0x10) 09:44:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x6, 0x6}]}, 0x24}}, 0x0) 09:44:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000149, 0x4) 09:44:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000115, 0x4) 09:44:36 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013f, 0x4) [ 2412.616838][ T35] kauditd_printk_skb: 16 callbacks suppressed [ 2412.616852][ T35] audit: type=1800 audit(1612431876.751:52487): pid=32348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14278 res=0 errno=0 09:44:36 executing program 4: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:44:36 executing program 1: set_mempolicy(0x1, &(0x7f00000000c0)=0xa, 0x8) [ 2412.711928][ T35] audit: type=1800 audit(1612431876.761:52488): pid=32347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:44:36 executing program 1: r0 = socket(0x2, 0x1, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e) 09:44:36 executing program 4: r0 = socket(0xa, 0x3, 0x7) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 09:44:37 executing program 4: shmctl$IPC_SET(0x0, 0x1, 0xfffffffffffffffd) 09:44:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000240)={0x4c, 0x12, 0xffffffffffffffff}, 0x4c}}, 0x0) [ 2412.945609][T32389] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2413.313784][ T35] audit: type=1800 audit(1612431877.451:52489): pid=32367 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14293 res=0 errno=0 [ 2413.370720][ T35] audit: type=1800 audit(1612431877.511:52490): pid=32366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2413.507159][ T35] audit: type=1800 audit(1612431877.651:52491): pid=32380 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:44:37 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000145, 0x4) 09:44:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@polexpire={0xc0, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x6e6bbc}}}, 0xc0}}, 0x0) 09:44:37 executing program 1: semtimedop(0x0, &(0x7f0000000000)=[{}, {0x1}, {}, {}, {}, {}], 0x9b, 0x0) 09:44:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000116, 0x4) 09:44:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014a, 0x4) 09:44:37 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000140, 0x4) [ 2413.539992][ T35] audit: type=1800 audit(1612431877.681:52492): pid=32383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:44:37 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, 0x0, 0x0) 09:44:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xb, 0x0, 0x0) 09:44:37 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000002000/0x3000)=nil) shmat(r0, &(0x7f0000002000/0x2000)=nil, 0x5000) 09:44:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@ipv6_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x0) 09:44:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2000000010000100"/20, @ANYBLOB='\b'], 0x20}}, 0x0) 09:44:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x10000000000015) [ 2414.244194][ T35] audit: type=1800 audit(1612431878.381:52493): pid=32401 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 [ 2414.294213][ T35] audit: type=1800 audit(1612431878.411:52494): pid=32399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14292 res=0 errno=0 09:44:38 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000146, 0x4) 09:44:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000800)={'veth0_to_team\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c80)=@getqdisc={0x24, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 09:44:38 executing program 1: openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002100)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@broadcast}}, 0xe8) 09:44:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014b, 0x4) 09:44:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000117, 0x4) 09:44:38 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000141, 0x4) [ 2414.386519][ T35] audit: type=1800 audit(1612431878.521:52495): pid=32404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14283 res=0 errno=0 09:44:38 executing program 4: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) [ 2414.453538][ T35] audit: type=1800 audit(1612431878.531:52496): pid=32415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:44:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 09:44:38 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='[\x00', 0x0) 09:44:38 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000001080)=""/4087, 0xfffffffffffffea1) 09:44:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, 0x0, 0x1, [@AF_INET6={0x4}]}]}, 0x28}}, 0x0) 09:44:38 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in=@multicast2, @in6=@private2}}, [@mark={0xc}]}, 0x5c}}, 0x0) 09:44:39 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000147, 0x4) 09:44:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000008c0)={@private0, @remote, @empty, 0x0, 0x0, 0x0, 0x300, 0x7076e2a0, 0x210}) 09:44:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000800)={'veth0_to_team\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c80)=@getqdisc={0x28, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xe}}, [{0x4}]}, 0x28}}, 0x0) 09:44:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000118, 0x4) 09:44:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014c, 0x4) 09:44:39 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000142, 0x4) 09:44:39 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x8}, 0xc) 09:44:39 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2, 0x0) 09:44:39 executing program 4: mount$fuse(0x0, 0x0, &(0x7f0000000dc0)='fuse\x00', 0x0, &(0x7f0000000e00)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id'}}) 09:44:39 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000008c0)) shmat(0x0, &(0x7f0000005000/0x2000)=nil, 0xf000) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f00000061c0)) 09:44:39 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0x7, 0x3) 09:44:39 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 09:44:40 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000148, 0x4) 09:44:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x139, 0x139, 0x3, [@const, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], '\x00'}]}, {0x0, [0x0]}}, 0x0, 0x157}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:44:40 executing program 4: r0 = socket(0x2, 0x1, 0x0) bind$unix(r0, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) 09:44:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000119, 0x4) 09:44:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014d, 0x4) 09:44:40 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000143, 0x4) 09:44:40 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x0, 0xfffe]) 09:44:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000700)={&(0x7f00000003c0), 0xc, &(0x7f0000000640)={&(0x7f0000000980)={0x1f0, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BEACON_HEAD={0xd5, 0xe, {@wo_ht={{}, {}, @broadcast}, 0x0, @random, 0x0, @val={0x0, 0x11, @random="8b5e195e14248e833ec44f3b604f3f5c2b"}, @val={0x1, 0x6, [{}, {}, {}, {}, {}, {}]}, @val={0x3, 0x1}, @void, @val={0x6, 0x2}, @void, @val={0x25, 0x3}, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @void, @val={0x72, 0x6}, @void, @void, [{0xdd, 0x4f, "6b854f283781d66dbe456575770a8a076c33b340a8da49a18e38b0f1a1a1f5042df4a07ec29a6f035a746160bc1717e4c28628d7c329d6c45dece440cc068ca9fd61d18c9829a1e205d4036ffc3474"}, {0xdd, 0x19, "89746fcb02d75ba982d92289ac1e9217cdbdea3fcd0af4b97d"}]}}, @NL80211_ATTR_BEACON_TAIL={0xfc, 0xf, [@fast_bss_trans={0x37, 0xee, {0x0, 0x7, "e66a2d3cca7f2601c4fe13148e31feca", "71b26c36267deb873ba1e961e7e40a1b323da7b9a34b31acc1ac1937bca66a42", "c253f980b4dec59927b6bfea6804eb739b948b749b44533e02ea046b883c1f73", [{0x0, 0x2, "44c8"}, {0x0, 0x5, "958c6f7614"}, {}, {0x0, 0x28, "678d6ec7e61223fb6d866fd7ca4d06b7ddff27d9ff219219145b156691efa0e37a24bde7cdc434b1"}, {0x0, 0x11, "93d1b2a183321f3e139a7d6f15cfc29609"}, {0x0, 0x27, "243478055c36ff544888b477a7a02950d496f6cda4cdf140f1daf26df0fc94a5adb6331dc54eac"}, {0x0, 0x27, "6ae425bd64348859447f44fe55dd3f5fd823a297cdf64e06ac2826cddd4be4b9a48625b5e520be"}]}}, @mesh_id={0x72, 0x6}]}]}, 0x1e5}, 0x1, 0x0, 0x0, 0x2000c000}, 0x20000040) 09:44:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'ipvlan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x0, 0x10002}}, 0x20}}, 0x0) 09:44:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000007700)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000340)={0x10, 0x10}, 0x10}], 0x1}, 0x0) 09:44:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000100)="e2c80000", 0x4) 09:44:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000003a40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_FRAME={0x98, 0x33, @ctrl_frame=@ba={{}, {}, @device_a, @device_a, @basic={{}, {}, "3a24476cea1fe1d1b59bd5ccfcfcbea993643f81db2ba3b343f8b54ddf85198e4cef3555a29d02c15cbb91037f4af6a89388a350d5eab88de2182ff0b8c90e9ebfb839a974cc69590146b2776248af10a4ba5e43238ff0681d64d9a70523c7db9ca7aab40f9e37cf7c037a7cc5a553d93256f433908ca3be4b4ba26dfbdc2145"}}}, @NL80211_ATTR_CONTROL_PORT_NO_ENCRYPT={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_FRAME={0x211, 0x33, @mgmt_frame=@auth={@with_ht={{{}, {}, @device_a, @broadcast, @from_mac=@broadcast}}, 0x0, 0x0, 0x0, @val={0x10, 0x1}, [{0xdd, 0xd1, "7d3252536a39dca2de0634dcd715203e3ca9aa4b26ad27fbf7da7a7f0ba9eac1e0ec7b7c78a701b7a0724ffc5b447c529328be020852c1c0e1addb7b7ead3c233930448908173b92c3f095d23dbbd6c16265d819d4dce46197e811ae4ae3742aaeb84782e0a09dd2bb0bd81ed1793b47696d15c6ec4d8ab9724ae38019f220faada4a3a7ed244c71c38f6a6354f6bda54b33448e3e4a285bcd9d55839c3f8f3d8c2fb5bdb8293d05d9d76f44a78b18219eb47127d63134ff01443112940e30aa4b55864e722e3efc675e9df7b95a04a960"}, {0xdd, 0x27, "3c0b849908f5688e3e1fd87c8d81887a3707884e6a0eddcd7ea6bac2e25659e152995f323e8bab"}, {0xdd, 0xea, "96992e13976baab0b3d17aaf7cdbc9397bddf89003c35c44d4d062166dd1517ba44585e1adac64f8b904651a41fd498d92b200167d88854cc5946c7868cdd1f28f42757f2153ee7f0870cbe52fb02d4b0306976cad6c4aad3b0f57d20fd0f78428c1e144368eb4aaa9e15d5592a4128a644f56516c8a7b95ed7c58d599250d07cedee46b2e72827e510a0368f37609bd42f5e4663185c01c14053bd22d2a1c8d9f3171b48c46d4f0c28aa47dadf93efb83b2cd7d98d32191d04229a0b20cec513f28bfd584ee2a50adfaa4541d63698842c036ee14d299159c39d888a39917a92170f8353a87db1dac75"}]}}, @NL80211_ATTR_FRAME={0x1be0, 0x33, @data_frame={@qos_ht={{{@type10={{}, {}, @initial, @device_a, @broadcast}}, {@type10={{}, {}, @random="a5264f19168b", @device_b}}}}, @a_msdu=[{@device_b, @device_a, 0xaf, "25316b14ff7873bf648c4d01bf84852898a895d59c703cb50a204588d537558983f065d99601f6e68660c943ecf88fd54e6da33dc378d2037879127fd4e35cb3677b79293a34f3858e9ffccc48448d1d76e82c4294bb38b4fe5197f14472819f71e8ce0a74b663b8a090f901d01e6c16d593617597a2ecef68a918ba5f41c68c8a5b10395af2c09dd59206106a55f2ce30828e14f33ca8ea8a02a9f88e427f5e77027f4d72df80f76a338c5f6d6f9e"}, {@broadcast, @device_a, 0xfff, "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"}, {@broadcast, @device_b, 0xac3, "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"}]}}]}, 0x1ec4}}, 0x0) 09:44:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="1400000022000501"], 0x14}], 0x1}, 0x0) 09:44:43 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280), 0x51) 09:44:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011a, 0x4) 09:44:43 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000149, 0x4) 09:44:43 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) sendto$inet(r0, &(0x7f0000000000)="bf", 0x1, 0x8080, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) 09:44:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014e, 0x4) 09:44:43 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000144, 0x4) 09:44:43 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) 09:44:43 executing program 1: r0 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000140)='o', 0x1, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 09:44:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) 09:44:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc) 09:44:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 09:44:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1, 'lblc\x00'}, 0x2c) 09:44:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'ipvlan1\x00'}) [ 2419.510582][T32565] 8021q: VLANs not supported on ipvlan1 09:44:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011b, 0x4) [ 2419.786590][ T35] kauditd_printk_skb: 12 callbacks suppressed [ 2419.786601][ T35] audit: type=1800 audit(1612431883.932:52509): pid=32542 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2419.852356][ T35] audit: type=1800 audit(1612431883.992:52510): pid=32543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:44:44 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70001d7, 0x4) 09:44:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x200408, 0x4) 09:44:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x4, 0x4) 09:44:44 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000145, 0x4) 09:44:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014f, 0x4) 09:44:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)={0x1c, 0x42, 0x105, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @str='\\:*\'\xaa{,\x00'}]}, 0x1c}], 0x1}, 0x0) [ 2419.946032][ T35] audit: type=1800 audit(1612431884.032:52511): pid=32544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:44:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) write$P9_RSTATFS(r0, &(0x7f0000000000)={0x43}, 0x43) [ 2420.032284][ T35] audit: type=1800 audit(1612431884.042:52512): pid=32541 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14292 res=0 errno=0 09:44:44 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000980)={0x2, 0xb, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2}]}, 0x20}}, 0x0) 09:44:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x1e, 0x4) 09:44:44 executing program 4: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_mreq(r0, 0x0, 0x23, 0x0, 0x0) 09:44:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f00000002c0)) 09:44:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011c, 0x4) [ 2420.518992][ T35] audit: type=1800 audit(1612431884.662:52513): pid=32568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14285 res=0 errno=0 [ 2420.687070][ T35] audit: type=1800 audit(1612431884.832:52514): pid=32577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14293 res=0 errno=0 [ 2420.751117][ T35] audit: type=1800 audit(1612431884.862:52515): pid=32582 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:44:45 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70001d8, 0x4) 09:44:45 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x1, 0x0, &(0x7f0000000080)) 09:44:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000000)={'syz_tun\x00', @ifru_map}) 09:44:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000150, 0x4) 09:44:45 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000146, 0x4) [ 2420.868324][ T35] audit: type=1800 audit(1612431885.012:52516): pid=32585 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:44:45 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast2}, 0x10) 09:44:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:44:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0xec, 0xffffffff, 0xffffffff, 0xec, 0xffffffff, 0x1bc, 0xffffffff, 0xffffffff, 0x1bc, 0xffffffff, 0x3, 0x0, {[{{@ip={@loopback, @private, 0x0, 0x0, 'bridge0\x00', 'veth1_to_hsr\x00'}, 0x0, 0xb8, 0xec, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}, @inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @common=@inet=@SET3={0x34, 'SET\x00', 0x3, {{}, {}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @dev, 0x0, 0x0, 'ip_vti0\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2ac) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000c00)={'raw\x00'}, &(0x7f0000000c40)=0x24) 09:44:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000140)={'vlan0\x00', @ifru_ivalue}) 09:44:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)={0x1c, 0x1e, 0x105, 0x0, 0x0, "", [@nested={0xa, 0x0, 0x0, 0x1, [@generic="38f7dcc9596a"]}]}, 0x1c}], 0x1}, 0x0) 09:44:45 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 09:44:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000000)={'macvlan0\x00', @ifru_names}) [ 2421.316489][ T35] audit: type=1800 audit(1612431885.462:52517): pid=32599 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14285 res=0 errno=0 [ 2421.573826][ T35] audit: type=1800 audit(1612431885.712:52518): pid=32609 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:44:45 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70001d9, 0x4) 09:44:45 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011d, 0x4) 09:44:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)={0x14, 0x26, 0x1, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) 09:44:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="14000000220005"], 0x14}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000015c0)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, 0x0}, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000001600)) 09:44:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000151, 0x4) 09:44:45 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000147, 0x4) 09:44:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x6, 0x0, &(0x7f0000000000)) 09:44:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f0000003180)) 09:44:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000014c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x84) 09:44:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0xc, 0x4) 09:44:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x14, 0x1, 0x3, 0x401}, 0x14}}, 0x0) 09:44:46 executing program 4: syz_mount_image$udf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:44:46 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000201, 0x4) 09:44:46 executing program 4: clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x8}, &(0x7f0000000440)={0x0, r0+10000000}, 0x0) 09:44:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000980)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x0, 0x0, 0x0, 0xa, 0x20}, {0x800, 0x0, 0xb5, 0x0, 0x0, 0x0, 0xfff}, {0x0, 0x0, 0x8}, 0xf7a, 0x0, 0x1, 0x1, 0x0, 0x2}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6}, 0x2, @in6=@ipv4={[], [], @empty}, 0x3505, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9}}, 0xe8) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x2, 0x10000025, 0x8, 0x7ff, 0x7fff, 0x7fffffff, 0x4, 0x0, 0xd515}, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) recvmmsg(0xffffffffffffffff, &(0x7f0000002c40)=[{{&(0x7f00000002c0)=@ipx, 0x80, &(0x7f0000002980)=[{&(0x7f00000006c0)=""/220, 0xdc}, {&(0x7f0000000500)=""/104, 0x68}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000640)=""/93, 0x5d}, {&(0x7f0000000180)=""/24, 0x18}, {0x0}, {&(0x7f0000002880)=""/249, 0xf9}], 0x7}, 0x9e}, {{&(0x7f0000002a40)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f0000002b40)=[{0x0}], 0x1}, 0x6}], 0x2, 0x0, &(0x7f0000002cc0)={0x77359400}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="b0254d", 0x3) pipe(&(0x7f00000000c0)) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x14}, 0x79}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @local}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x4c], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x21200e8}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:44:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000152, 0x4) 09:44:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011e, 0x4) 09:44:46 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000148, 0x4) 09:44:46 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x14, 0x2, 0x3, 0x301}, 0x14}}, 0x0) 09:44:46 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() getpriority(0x2, r0) 09:44:46 executing program 4: mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) 09:44:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0) 09:44:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0xa, &(0x7f0000001280)=@file={0x0, './file0\x00'}, 0xa) 09:44:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) execve(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x8) sendto(0xffffffffffffffff, &(0x7f0000000540)="3ada8e3b1cd27ff8d746f0e5f57f31b1660482ddb87e81ee5a970f5b5e55c5cf4aa41875", 0x24, 0x0, 0x0, 0x0) 09:44:47 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000300, 0x4) 09:44:47 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) 09:44:47 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000153, 0x4) 09:44:47 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000149, 0x4) 09:44:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011f, 0x4) 09:44:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 09:44:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {0xffffffffffffffff}, {&(0x7f0000000340)='U', 0x1}], 0x3}, 0x0) 09:44:47 executing program 4: setuid(0xffffffffffffffff) shmget(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 09:44:47 executing program 4: utimes(0x0, &(0x7f00000000c0)={{}, {0x0, 0xfffffffffffffffb}}) 09:44:47 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x2000, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) 09:44:47 executing program 1: setuid(0xffffffffffffffff) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 09:44:47 executing program 4: socket$inet6(0x18, 0x5b352d8c54bbde8, 0x0) 09:44:48 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000301, 0x4) 09:44:48 executing program 1: open$dir(&(0x7f0000000180)='./file0\x00', 0x200, 0x0) chown(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) 09:44:48 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000080)="7e682e7907ecd8706c8f4c3f4695b46d4c7da80ad97e47c9cf7e7416bcdb3d9f41c8abdd7d4ac3754ca72ac65b7554ec3f749e145903ec8f877f2e297cc4b86e83fa65c8dde3dd8343af544ce50c781f1077a2b94aa071826906c1fc9dc2ef21458408", 0x63) 09:44:48 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014a, 0x4) 09:44:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000120, 0x4) 09:44:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000154, 0x4) 09:44:48 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0x8) 09:44:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000040)="3414275ed9115adfbb5fa5d53cd9ab15c37ae54db75b846d2f00cdf9f7835b46247aff00e8c6aaffdcdeda9699866695ae3cc3aab105dbd61a9980f81ce4d447537aea286a7cbd8de334d00db90ad737e3c1a281fa6d61b6e89ff1fef7123a3398ceba1a85a5f9da00701a46f6857de858ce99b6fdb3a1c9079cb2747165eb7968b8020c90d3b41b48ccc6b6b86a433ee5459fde85a12f25d5c5d058efa12107c89d867b24714350eea3e511f9c027f7b91ff9328bf228be27e4ee386dfaca4d1fd4d81fdd216891ca1497199f726b3206bc94f35cb0121583bd25acf802bc8b401cf472c97cdb1c018ca9ff91226a609b99d3e92efc54a6ffa300aad5f48631c7967e1099df43b25d89f10aa90628eb7bfe6334d597ef3b72c10a32b90e67689f7c8f7c2b748402ddea98501d2dc95c00280b660f25696228a95398e9b2437073cc910e99b70c8c6d1980df6481f0cb50549a4930f77c79c1c2052fe349e5718bdb90ae86f41ebfea4ec152d6a9d3513dcf40cee5b1461b6dc23d5195abbfc6eb8b1d4c422d1f7342f3dcadcd3160ea72e0a601fdc5eb5e4f64e84f85a4518cf966d829d69f14273054df24df303479c672eb85ee607b9e83733db6422a561dc782859d67e0f0aecc87be61d53240dc1fe0b6cf5e91a4a40fe762dfe19a417d68163a6ee455b6e2aceac118d94f1dca2f304ab229f7186e0af924d44b40dc043a6e5812cdfb8e23cc1c56095f51686e965f7beb0110ef5666b8baa482ceec492fabd7670a20cd016eb7fd818766e70293f219d1b8adf153dcd99ec3ed375aed17e9702087e0a52542c81ed77bd8211ba2ce82dc95926ca9f318ad663cd23125e077b3735b8ad638d8669841088f5ea9eb7029480a0a614ebfb847b8d632f0f8cb3dcf29958fb023f94759d6d7fc416d03af35cf511e04390dc3ebf991a179b4645c08107eba53ce931f72a1595cdb344e9ce7d2973756fdc72153d6361a63cd47808c702ae73b7c0e9eb9343cc012aeeb6139835109aaf84a7ffc2fc7c0aba89522ed46a212aded70d69e1b4a24d927c307f4c00f137b8ba77d42b1bafa57e668b6ab6e236c470612ef0b1e957237962433a0e404f5b9b507ba54c404299f87436e7e580c69a1ba6afed15a17ed00f306c49e33181c3550be9363f58444f1281f8865e34e94caf2e086d930e65898f686ead29e1ddb87a5c94273f3cb020ae8b220de1bbcd845c932e423566c64bdad2443ac880b4ac649fae399514f6ff7fe267aed55bd8f0c3f38570865e69f8ef020d7a4df4efff2d8cc4de043881b6cb43a94bdce865dab71538ea24f7a826dc909ffa63908fb331491984e55eb3fce6610de4a6dc7b5f7404b88742980096ba09c884f71217102a83e4bef4ee0fb86fe3909ad7cb0707dedeb262cc96127aa1d893c23ea0c8e71fd52592523bf9bb1d28d9b31cb5f243babe087a122e1ef731d58533b9acf9e0acb7950a64d48eb8fff19a9d108c4f4a4863dc61c29f74506bf68f93edceab10db1a2cddeb2f4596b680a41328289ceffe23b80ab3c45a10e2059693a8fdb6603d4eb045b2470c25cd365dffda09aacff53c1204cd2453471a0472d0bdf2bac2fab81ec89a52459aeed58fbaab6a8d84c3400f76420b737718bf13f4ca502aee3e919d71bf69d418da5da90f82bc0f42434a1eb245b1caa370e83bc715261f2069e8a00f4df22aca84e41bc7302c4de330c7b29d957e54ae8b9d6392755782903b6f893414a5b710237de6bb2e401d295fcef9822c64a216989ad6fd8fe9bb4aa8ab0d720be6bdadc0e7a924ca2a5605d041cc4fa7e809bd0ff6e756ec802b52203cd335ed83c44bcbb9de5c366820a1a19693284e20d5b9a7b61532c22116fedee0539f5e3e9a3ee9ce15540e0ef989f7e8740e928d7ce802e6fff014296045aa75f7d3166369c8876d604d85dfc226c15c4f622f196a859800605c301965461070e15e451fce4bbb40fc6861849cd6799aa5247a093254cb4b1f62fc3d3de290ac763ece864a85f911357239a39cca0c36ff207014e36381490ac2f16074799ee7715dff05e2693ea2f61d82d2ba6bb3882ad576043e059cc91ed447e4d8a282def147b29c6dc480e34c38fe4e484693c0e01f927eaea62220f824b01e4f3ab614acfdbaae2b7d6a31d6a3d5f5c4625fd1953269b41d9a4e50e21cb549ed974ee9c6b1ae6be4e01e1deb9e2367df9f66e8c425ddfe2a7e55843ec57e5d884b35965588164de945ad4840ecfdd938e5cd8153203570b94c177d805404d6e6095f1d7ad64a8c488a00ecaa0ca6167d2af3a2e019f1355aab9e0c9129fa7fc07ede5666a446bdc26a8722ad80d88f63ada9ecd2a3fdc9603a324ae4da370c9577f096789053bf9ff8e57f5e479b892d3c0648b73a0328a73c9b8fa4de6fe003ca18bc7cb1678c4aa099df38e4ccac2079b5b0ec3e72424cfc6db173a4104da5a523d250b527cbaf2cdb2c83ca4ed5699bf28255434326038673a4e80699192c76d82132af8976977903cb307ae0bf509274c4d6f2bf8551ac659608fbd9f5263e5affe0d324848e927e6a181239033d1e6f01875c2ff30a608d81a060e5b5f81b0ef02cd8db950e4dfc4c4f5d158b86d81a2f2871fcb85471d07435d0c6a913d190daf35f16e31e7a33b0925a7e6adcb64b1b6d22be44494880f833969cd1689d57d6e8dd9dc58116557c68d7921", 0x784, 0x0, &(0x7f0000001040)=@abs={0x0, 0x0, 0x2}, 0x8) 09:44:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x405) 09:44:48 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) 09:44:48 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semctl$SEM_INFO(r0, 0x4, 0x13, &(0x7f00000000c0)=""/137) 09:44:48 executing program 4: open$dir(&(0x7f0000000040)='./file0\x00', 0x6940, 0x1) 09:44:49 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000500, 0x4) 09:44:49 executing program 1: r0 = eventfd(0x1ff) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) 09:44:49 executing program 4: open$dir(&(0x7f0000000440)='./file0\x00', 0x80040, 0xad) 09:44:49 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000201, 0x4) [ 2424.995542][ T35] kauditd_printk_skb: 16 callbacks suppressed [ 2424.995555][ T35] audit: type=1800 audit(1612431889.133:52535): pid=32746 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:44:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000121, 0x4) 09:44:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000155, 0x4) [ 2425.065677][ T35] audit: type=1800 audit(1612431889.143:52536): pid=32749 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2425.092729][ T35] audit: type=1800 audit(1612431889.183:52537): pid=32747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:44:49 executing program 4: ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0xffffffffffffffff) [ 2425.127483][ T35] audit: type=1800 audit(1612431889.193:52538): pid=32758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:44:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x5) 09:44:49 executing program 4: r0 = socket(0x2, 0x1, 0x0) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="31be523aef15"}, 0x14) 09:44:49 executing program 4: r0 = socket(0x2, 0x1, 0x0) sendto$packet(r0, 0x0, 0x0, 0x44004, 0x0, 0x0) 09:44:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10, 0x0}, 0x4000090) 09:44:49 executing program 4: r0 = socket(0x1, 0x5, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) [ 2425.824933][ T35] audit: type=1800 audit(1612431889.963:52539): pid=313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14293 res=0 errno=0 [ 2425.874533][ T35] audit: type=1800 audit(1612431890.003:52540): pid=316 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:44:50 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000501, 0x4) 09:44:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffe35) 09:44:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000122, 0x4) 09:44:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000156, 0x4) 09:44:50 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000300, 0x4) 09:44:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000180), &(0x7f0000000140)=0xfffffffffffffcc3) 09:44:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000380)={0x10, 0x2}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x40080, 0x0, 0x0) [ 2425.947208][ T35] audit: type=1800 audit(1612431890.053:52541): pid=309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14281 res=0 errno=0 09:44:50 executing program 4: lchown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) [ 2426.013860][ T35] audit: type=1800 audit(1612431890.053:52542): pid=317 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:44:50 executing program 1: r0 = socket(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000080)="fa", 0x1}], 0x1, 0x0, 0x20}, 0x0) sendto$unix(r0, 0x0, 0x0, 0x185, 0x0, 0x0) 09:44:50 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c}, 0x1c) shutdown(r0, 0x1) shutdown(r0, 0x1) 09:44:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvfrom$inet(r0, 0x0, 0x0, 0xc2, 0x0, 0x0) 09:44:50 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000003440)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/ptmx\x00', 0x40000, 0x0) [ 2426.738651][ T35] audit: type=1800 audit(1612431890.873:52543): pid=341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:44:50 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000600, 0x4) 09:44:50 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/ptmx\x00', 0x400, 0x0) 09:44:50 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0a01e7182893"], 0xa) 09:44:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000123, 0x4) 09:44:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000157, 0x4) 09:44:50 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000301, 0x4) [ 2426.797870][ T35] audit: type=1800 audit(1612431890.903:52544): pid=351 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:44:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f00000002c0), 0x1) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="38d4684e16baea5618cbdab0abf03881e52d3f7b020fb4e7309d5176e20dfc31d5492f86d90f83a6b8d7b19949b796f2fda8c6bb6f71302202699dfe740441fbb63fde875713079117fe320b9108411168b7e3a05e8600c8173bc202450f6a620971e1aecc55aba468599ba6c0815cf3e95527dacc3f16cb5576afb3f350e1dc97dd422f7ad5370e5bb7d2915d316a86a5960fe0d3e38b78c371b9fc74f262d61e500d6d6358488ba5f110859b3368c0c1d681b147e0eaf2f049", 0xba}, {&(0x7f0000000680)="bb9219d09837774e19aec57ad4524ded5c58b218cc4eadbeb54517d0e5c5d6d9cceec1cf2488b5f851f3482cf556eeb10a792fccfb09dce45519ffaf08a4bdfb9add856f6c0b4944586068f40ce3c25300a01df9789f0b28e90aa9f67f4fda1647ca419b289981b269050006a133aeee0f3e8804b1e750fdefff374029c90b3d4977224e9b", 0x85}, {&(0x7f0000000a80)="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", 0x18a}, {&(0x7f0000000e40)="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", 0x294}], 0x4}, 0x0) 09:44:51 executing program 1: r0 = socket$inet6(0x1c, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000140)='Q', 0x1, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x3}, 0x1c) 09:44:51 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f0000000740)=ANY=[], 0xa, &(0x7f0000001840)=[{&(0x7f0000000780)="82", 0x1}], 0x1, &(0x7f0000001ac0)=[@rights, @cred, @rights, @rights, @rights, @rights], 0xb0}, 0x0) 09:44:51 executing program 1: r0 = socket$inet6(0x1c, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 09:44:51 executing program 1: socket$inet6_sctp(0x1c, 0x0, 0x84) 09:44:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="38d4684e16baea5618cbdab0abf03881e52d3f7b020fb4e7309d5176e20dfc31d5492f86d90f83a6b8d7b19949b796f2fda8c6bb6f71302202699dfe740441fbb63fde875713079117fe320b9108411168b7e3a05e8600c8173bc202450f6a620971e1aecc55aba468599ba6c0815cf3e95527dacc3f16cb5576afb3f350e1dc97dd422f7ad5370e5bb7d2915d316a86a5960fe0d3e38b78c371b9fc74f262d61e500d6d6358488ba5f110859b3368c0c1d681b147e0eaf2f049", 0xba}, {&(0x7f0000000680)="bb9219d09837774e19aec57ad4524ded5c58b218cc4eadbeb54517d0e5c5d6d9cceec1cf2488b5f851f3482cf556eeb10a792fccfb09dce45519ffaf08a4bdfb9add856f6c0b4944586068f40ce3c25300a01df9789f0b28e90aa9f67f4fda1647ca419b289981b269050006a133aeee0f3e8804b1e750fdefff374029c90b3d4977224e9b", 0x85}, {&(0x7f0000000a80)="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", 0x18a}, {&(0x7f0000000340)="058dc4cbd3402a2e1e07e6ccd103754852a29efee8f772f237f0540001000014000059098dcb", 0x26}, {&(0x7f0000000e40)="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", 0x296}], 0x5}, 0x0) 09:44:51 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000601, 0x4) 09:44:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000158, 0x4) 09:44:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000124, 0x4) 09:44:51 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000500, 0x4) 09:44:52 executing program 4: setuid(0xffffffffffffffff) setreuid(0x0, 0x0) 09:44:52 executing program 4: socketpair(0x1c, 0x0, 0x0, 0x0) 09:44:52 executing program 4: r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f00000000c0)={@loopback}, 0x14) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 09:44:52 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000380), 0x4) 09:44:52 executing program 1: r0 = socket$inet6(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 09:44:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000159, 0x4) 09:44:52 executing program 4: r0 = socket$inet6(0x1c, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000140)='Q', 0x1, 0x20301, &(0x7f0000000200)={0x1c, 0x1c, 0x3}, 0x1c) 09:44:52 executing program 1: r0 = socket(0x2, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000000000)={0x401}, 0x8) dup2(r0, r1) 09:44:52 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000700, 0x4) 09:44:52 executing program 4: getpeername$unix(0xffffffffffffff9c, 0x0, 0x0) 09:44:52 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000125, 0x4) 09:44:52 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000501, 0x4) 09:44:52 executing program 1: accept$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0) 09:44:52 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800) 09:44:52 executing program 4: chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) 09:44:52 executing program 1: sendmsg$unix(0xffffffffffffff9c, &(0x7f00000005c0)={&(0x7f0000000340)=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000000580)}, 0x0) 09:44:52 executing program 1: pipe2(&(0x7f0000001a00)={0xffffffffffffffff}, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 09:44:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70001ac, 0x4) 09:44:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x8) 09:44:53 executing program 1: r0 = shmget(0x2, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r0, 0xb) 09:44:53 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000701, 0x4) 09:44:53 executing program 4: r0 = socket$inet6(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:44:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000126, 0x4) 09:44:53 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000600, 0x4) 09:44:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f00000002c0), 0x1) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="38d4684e16baea5618cbdab0abf03881e52d3f7b020fb4e7309d5176e20dfc31d5492f86d90f83a6b8d7b19949b796f2fda8c6bb6f71302202699dfe740441fbb63fde875713079117fe320b9108411168b7e3a05e8600c8173bc20245", 0x5d}, {&(0x7f0000000680)="bb9219d09837774e19aec57ad4524ded5c58b218cc4eadbeb54517d0e5c5d6d9cceec1cf2488b5f8", 0x28}], 0x2}, 0x0) 09:44:53 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0xfffffff9}, 0x14) 09:44:53 executing program 4: pipe2(&(0x7f0000001a00)={0xffffffffffffffff}, 0x0) accept$unix(r0, &(0x7f0000003540)=@abs, &(0x7f0000003580)=0x8) 09:44:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000380)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000000), &(0x7f00000000c0)=0xb8) 09:44:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000127, 0x4) 09:44:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70001ad, 0x4) 09:44:54 executing program 4: r0 = socket$inet6(0x1c, 0x1, 0x0) bind(r0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 09:44:54 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000801, 0x4) 09:44:54 executing program 4: getresuid(&(0x7f00000001c0), &(0x7f00000006c0), &(0x7f0000000700)) 09:44:54 executing program 4: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x6) 09:44:54 executing program 4: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1c, 0x1c, 0x1}, 0x1c) 09:44:54 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000601, 0x4) [ 2430.430115][ T35] kauditd_printk_skb: 16 callbacks suppressed [ 2430.430124][ T35] audit: type=1800 audit(1612431894.563:52561): pid=512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:44:54 executing program 1: setuid(0xffffffffffffffff) socket$inet6(0x1c, 0x3, 0x0) 09:44:54 executing program 4: r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, &(0x7f0000000040)=ANY=[], 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 09:44:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000128, 0x4) 09:44:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f00000002c0), 0x1) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = accept4$inet(r0, 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="38d4684e16baea5618cbdab0abf03881e52d3f7b020fb4e7309d5176e20dfc31d5492f86d90f83a6b8d7b19949b796f2fda8c6bb6f71302202699dfe740441fbb63fde875713079117fe320b9108411168b7e3a05e8600c8173bc202450f6a620971e1aecc55aba468599ba6c0815cf3e95527dacc3f16cb5576afb3f350e1dc97dd422f7ad5370e5bb7d2915d316a86a5960fe0d3e38b78c371b9fc74f262d61e500d6d6358488ba5f110859b3368c0c1d681b147e0eaf2f049", 0xba}, {&(0x7f0000000680)="bb9219d09837774e19aec57ad4524ded5c58b218cc4eadbeb54517d0e5c5d6d9cceec1cf2488b5f851f3482cf556eeb10a792fccfb09dce45519ffaf08a4bdfb9add856f6c0b4944586068f40ce3c25300a01df9789f0b28e90aa9f67f4fda1647ca419b289981b269050006a133aeee0f3e8804b1e750fdefff374029c90b3d4977224e9b", 0x85}, {&(0x7f0000000a80)="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", 0x18a}, {&(0x7f0000000340)="058dc4cbd3402a2e1e07e6ccd103754852a29efee8f772f237f0540001000014000059098dcb", 0x26}, {&(0x7f0000000e40)="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", 0x286}], 0x5}, 0x0) [ 2430.570967][ T35] audit: type=1800 audit(1612431894.683:52562): pid=518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14288 res=0 errno=0 09:44:54 executing program 1: open$dir(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 09:44:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70001ae, 0x4) [ 2430.675608][ T35] audit: type=1800 audit(1612431894.803:52563): pid=528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:44:54 executing program 1: mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 09:44:55 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000900, 0x4) 09:44:55 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1001, 0x0, 0x0) [ 2430.906889][ T35] audit: type=1800 audit(1612431895.043:52564): pid=532 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:44:55 executing program 1: mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) 09:44:55 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0xc, 0x0, 0x0) 09:44:55 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000700, 0x4) 09:44:55 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000000)={0xffffffffffffff00}, 0x10) [ 2431.305811][ T35] audit: type=1800 audit(1612431895.443:52565): pid=553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:44:55 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) sendto(r0, 0x0, 0x0, 0x1, &(0x7f0000001000)=@in6={0x18, 0x2}, 0xc) 09:44:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000129, 0x4) [ 2431.459193][ T35] audit: type=1800 audit(1612431895.593:52566): pid=557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14285 res=0 errno=0 09:44:55 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x5, 0x0, 0x0) 09:44:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000201, 0x4) [ 2431.526688][ T35] audit: type=1800 audit(1612431895.613:52567): pid=563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:44:55 executing program 1: mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 09:44:55 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x24, 0x0, 0x0) 09:44:56 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000901, 0x4) 09:44:56 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x3}, 0xc) [ 2431.922778][ T35] audit: type=1800 audit(1612431896.053:52568): pid=571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:44:56 executing program 4: mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 09:44:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012a, 0x4) [ 2432.124031][ T35] audit: type=1800 audit(1612431896.253:52569): pid=597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:44:56 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000701, 0x4) [ 2432.258174][ T35] audit: type=1800 audit(1612431896.393:52570): pid=587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:44:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000300, 0x4) 09:44:56 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000040)) 09:44:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 09:44:56 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x2c8, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 09:44:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012b, 0x4) 09:44:56 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0xc) 09:44:57 executing program 1: r0 = getgid() r1 = getgid() setregid(r1, r0) 09:44:57 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000a00, 0x4) 09:44:57 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x2c8, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) 09:44:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) 09:44:57 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[], 0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=@dstopts, 0x8) 09:44:57 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000801, 0x4) 09:44:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000301, 0x4) 09:44:57 executing program 1: recvmsg$kcm(0xffffffffffffffff, 0x0, 0xc135422786c65c79) 09:44:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f00000002c0)={0x8, 'vlan0\x00', {'wg1\x00'}}) 09:44:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x1, 0x0, 0x0, {0x4}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x4001, 0x4}]}]}, 0x20}}, 0x0) 09:44:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012c, 0x4) 09:44:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001540)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(wp512-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002440), 0x3ffffffffffff67, 0x0, 0x0) 09:44:57 executing program 1: setrlimit(0x0, &(0x7f0000000080)) 09:44:57 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000a01, 0x4) 09:44:57 executing program 1: socketpair(0x23, 0x0, 0x200000, &(0x7f0000000400)) 09:44:57 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000002, 0xc3072, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x8000, 0x4, 0x1}) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @private1, @ipv4={[0x0, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @private}}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$unix(r2, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1c0f0000009bda4c1ac7f40000000100000002000000", @ANYRES16, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000002001c0000200000d15000000100000002000000335e9ba7fbbcaa93722e95ffd395a4bd4174cb8dfe328ee4e1f5484df78434d9a4e1341023b99cc31d16cd9728ce93", @ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRESDEC, @ANYRES32, @ANYRESDEC=r1], 0xf8}, 0x20000000) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) r3 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, r3}, 0xc) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="580000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="bb0e0000000000003000128009000100766c616e000000002000028006000100000000000c0002000e0000000a0000000600050088a800000800050077bc70128ecbd3429e60b9fa9315dfc73a91958665ec99dedc2c653ab3602f0f0847dd84172b9e7b91f36c34", @ANYRES32=r6, @ANYBLOB], 0x58}}, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0x1) 09:44:58 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000002, 0xc3072, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x8000, 0x4, 0x1}) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @private1, @ipv4={[0x0, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @private}}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$unix(r2, &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1c0f0000009bda4c1ac7f40000000100000002000000", @ANYRES16, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000002001c0000200000d15000000100000002000000335e9ba7fbbcaa93722e95ffd395a4bd4174cb8dfe328ee4e1f5484df78434d9a4e1341023b99cc31d16cd9728ce93", @ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRESDEC, @ANYRES32, @ANYRESDEC=r1], 0xf8}, 0x20000000) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) r3 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, r3}, 0xc) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="580000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="bb0e0000000000003000128009000100766c616e000000002000028006000100000000000c0002000e0000000a0000000600050088a800000800050077bc70128ecbd3429e60b9fa9315dfc73a91958665ec99dedc2c653ab3602f0f0847dd84172b9e7b91f36c34", @ANYRES32=r6, @ANYBLOB], 0x58}}, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0x1) 09:44:58 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000900, 0x4) 09:44:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x29, 0x0, 0x1f, 0x0, 0x0, @local, @mcast1}}) 09:44:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000500, 0x4) 09:44:58 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @random="ac7e455dde74"}, 0x10) 09:44:58 executing program 1: socket$inet(0x2, 0x8080a, 0x4) 09:44:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012d, 0x4) 09:45:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x1}]}}, &(0x7f00000001c0)=""/161, 0x26, 0xa1, 0x1}, 0x20) 09:45:02 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f00000010c0)) 09:45:02 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000b00, 0x4) 09:45:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000501, 0x4) 09:45:02 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000901, 0x4) 09:45:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012e, 0x4) 09:45:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="e19788462d0f1c60ad7202"], 0x14}}, 0x0) 09:45:02 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x180000000) 09:45:02 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000100), 0x4) 09:45:02 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x7, 0x0, &(0x7f0000000040)) 09:45:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @generic={0x0, "a5814271318a917f020e1fd9231b"}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @sco={0x1f, @none}, 0x7, 0x0, 0x0, 0x0, 0xaa}) 09:45:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x10000, 0x32}, 0x0, @in6=@loopback, 0x0, 0x0, 0x1, 0xb7, 0x1fd}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) 09:45:02 executing program 1: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000004c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)=ANY=[]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 09:45:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x8000000000005) [ 2438.479345][ T35] kauditd_printk_skb: 13 callbacks suppressed [ 2438.479357][ T35] audit: type=1804 audit(1612431902.614:52584): pid=770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir253231805/syzkaller.Xd9ZTR/5015/cgroup.controllers" dev="sda1" ino=14303 res=1 errno=0 [ 2438.761549][ T35] audit: type=1800 audit(1612431902.894:52585): pid=737 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:45:02 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000b01, 0x4) 09:45:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000600, 0x4) 09:45:03 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000a00, 0x4) 09:45:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @dev}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x38590000000000, 0x0, 0x0, 0x0, 0x200000000000000}, {}, 0xffffffff, 0x0, 0x1}, {{@in=@rand_addr=0x64010101, 0x10000, 0x32}, 0x0, @in6=@loopback, 0x0, 0x0, 0x1, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x7000000) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) 09:45:03 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@getsa={0x28, 0x12, 0x54359cf612d99ab7, 0x0, 0x0, {@in6=@private2}}, 0x28}}, 0x0) 09:45:03 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012f, 0x4) [ 2438.799688][ T35] audit: type=1800 audit(1612431902.934:52586): pid=738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14300 res=0 errno=0 [ 2438.895691][ T35] audit: type=1800 audit(1612431902.934:52587): pid=735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14292 res=0 errno=0 [ 2438.935580][ T788] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 09:45:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)={0x1c, r1, 0xb01, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 2439.014558][ T35] audit: type=1800 audit(1612431902.934:52588): pid=740 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14275 res=0 errno=0 09:45:03 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x0) dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) 09:45:03 executing program 4: getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x7ff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setpipe(r1, 0x407, 0x0) 09:45:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) 09:45:03 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 09:45:03 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x2, [@var={0x9, 0x0, 0x0, 0xe, 0x4}, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x2}, {}, {}]}, @func_proto, @array, @func_proto, @typedef, @struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}, {}]}, @fwd]}}, 0x0, 0xd2}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) wait4(r0, 0x0, 0x8, 0x0) [ 2439.614113][ T35] audit: type=1800 audit(1612431903.754:52589): pid=793 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14288 res=0 errno=0 [ 2439.772081][ T35] audit: type=1800 audit(1612431903.904:52590): pid=803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:45:04 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000c00, 0x4) 09:45:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) fcntl$setstatus(r0, 0x4, 0x4c00) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 09:45:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000601, 0x4) 09:45:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000130, 0x4) 09:45:04 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000a01, 0x4) [ 2439.824445][ T35] audit: type=1800 audit(1612431903.954:52591): pid=787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14283 res=0 errno=0 [ 2439.858038][ T35] audit: type=1800 audit(1612431903.954:52592): pid=805 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14302 res=0 errno=0 09:45:04 executing program 1: setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000680)=ANY=[@ANYBLOB="08000000000000000a00000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000033f17ae17e1d4e14fe69c761c9b81954aecab1469c161f2e85d19c505"], 0x210) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="08000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003"], 0x210) close(r0) 09:45:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) socket(0x2, 0x0, 0x408) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x0) r3 = open$dir(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, "c946a50067e1f4b0f92aa184167fbac53cf7d7749645f7e3ca0d728d5f026573836c185620c469fda8cb40f2cda39c1cdf53c86892dbb5129f9f9247bc13761f", "48d73fd66454b0750522d406d9db238eda8ce1381ee1536a8f31394236692fe398768f5576698f1fa8137b5486fa33eb050f515b2a58cc68e63c5fdc56d27e0f", "3d6e941291e4e1b7bb8a5e9d9279d452956817a22069988226aaa743660c74aa"}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) setuid(0xee01) fcntl$notify(r3, 0x402, 0x14) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(r5, 0x0, r5) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4041c1, 0xc040a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xfffffffffbffffff, 0xffffffffffffffff, 0x0) 09:45:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) fcntl$setstatus(r0, 0x4, 0x4c00) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000340)="b4", 0x1}]) 09:45:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) fcntl$setstatus(r0, 0x4, 0x4c00) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000340)="b4", 0x1}]) 09:45:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f00000004c0)=[{r0}], 0x1, 0x800) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x7) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) 09:45:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) fcntl$setstatus(r0, 0x4, 0x4c00) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000340)="b4", 0x1}]) 09:45:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000131, 0x4) [ 2440.507487][ T35] audit: type=1800 audit(1612431904.644:52593): pid=838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:45:04 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000c01, 0x4) 09:45:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000700, 0x4) 09:45:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) fcntl$setstatus(r0, 0x4, 0x4c00) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000340)="b4", 0x1}]) 09:45:04 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000b00, 0x4) 09:45:05 executing program 4: r0 = getpid() r1 = getpid() r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') kcmp(r1, r0, 0x0, r2, r3) 09:45:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000005680)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x80}, [@NDA_LLADDR={0xa, 0x2, @link_local={0x7}}]}, 0x28}}, 0x0) 09:45:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000005680)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x80}, [@NDA_LLADDR={0xa, 0x2, @link_local={0x7}}]}, 0x28}}, 0x0) 09:45:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000005680)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x80}, [@NDA_LLADDR={0xa, 0x2, @link_local={0x7}}]}, 0x28}}, 0x0) 09:45:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000005680)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x80}, [@NDA_LLADDR={0xa, 0x2, @link_local={0x7}}]}, 0x28}}, 0x0) 09:45:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1ff}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 09:45:05 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000180)={0x6, 'veth1_macvtap\x00'}) 09:45:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000132, 0x4) 09:45:05 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000d00, 0x4) 09:45:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000701, 0x4) 09:45:05 executing program 4: unshare(0x20000400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) close(r0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 09:45:05 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x7e, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 09:45:05 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000b01, 0x4) 09:45:05 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x103002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/248) write$binfmt_aout(r0, &(0x7f0000001580)=ANY=[], 0xff2e) 09:45:06 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:45:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000133, 0x4) 09:45:06 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000180)=0x1c, 0x4) r1 = socket$netlink(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[], 0x4c}}, 0x0) 09:45:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x4, &(0x7f0000000100)=@framed={{}, [@ldst={0x0, 0x0, 0x1, 0x0, 0x0, 0x74}]}, &(0x7f0000000400)='GPL\x00', 0x3, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:06 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 09:45:06 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000d01, 0x4) 09:45:06 executing program 4: madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) 09:45:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x6, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f0e}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @ldst={0x6, 0x0, 0x1}]}, &(0x7f0000000400)='GPL\x00', 0x3, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000801, 0x4) 09:45:06 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000c00, 0x4) 09:45:06 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5421, 0x0) 09:45:06 executing program 4: timer_create(0x3, 0x0, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x77359400}, {0x77359400}}, &(0x7f0000000300)) 09:45:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000134, 0x4) 09:45:06 executing program 4: syz_emit_ethernet(0x62, &(0x7f00000003c0)={@local, @broadcast, @val={@void}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, 'V\v*', 0x28, 0x6, 0x0, @mcast2, @loopback, {[], @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}, 0x0) 09:45:06 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/zoneinfo\x00', 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 09:45:06 executing program 4: timer_create(0x3, 0x0, &(0x7f0000000280)) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{}, {0x77359400}}, 0x0) 09:45:06 executing program 1: bpf$MAP_CREATE(0x10, &(0x7f0000000140), 0x40) 09:45:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1, 0x0, &(0x7f0000000280)) 09:45:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0x0) 09:45:07 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000e00, 0x4) 09:45:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000900, 0x4) 09:45:07 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000c01, 0x4) 09:45:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x1, 0x1, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x0, 0x9}], &(0x7f0000000400)='GPL\x00', 0x5, 0xe0, &(0x7f0000000440)=""/224, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:07 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000135, 0x4) 09:45:07 executing program 4: syz_usb_connect$cdc_ncm(0x2, 0x6e, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}}}}]}}, 0x0) 09:45:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x1, 0x1, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x0, 0x9}], &(0x7f0000000400)='GPL\x00', 0x5, 0xe0, &(0x7f0000000440)=""/224, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x1, 0x1, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x0, 0x9}], &(0x7f0000000400)='GPL\x00', 0x5, 0xe0, &(0x7f0000000440)=""/224, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x1, 0x1, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x0, 0x9}], &(0x7f0000000400)='GPL\x00', 0x5, 0xe0, &(0x7f0000000440)=""/224, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x0, 0x0, 0xffff, 0x0, 0x1}, 0x40) 09:45:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f0000000340)=@l2tp={0x2, 0x0, @empty}, 0x80) [ 2443.815027][T22656] usb 5-1: new full-speed USB device number 70 using dummy_hcd [ 2444.104922][ T35] kauditd_printk_skb: 14 callbacks suppressed [ 2444.104932][ T35] audit: type=1800 audit(1612431908.245:52608): pid=1021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14275 res=0 errno=0 [ 2444.214783][T22656] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 2444.231485][T22656] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 512, setting to 64 09:45:08 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000e01, 0x4) 09:45:08 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0xf10, 0x3ed, 0x0, 0x0, 0x0, "b76560d3545c1e5506ccf3b3061060af3ec4917f5638dd233bcf60de4c8522716b11de4b1d5a7d3aad607c8fe0d6231c372f6fb8cc9834ff0eab2dfb136ee01cf7b5f3564bf3b9bb97fbba2c5c1496432127d854b6c52059de264e5bbadcdfa5256407cff7726e54e362e3a027ade8a843a7c5b49711e9c5878e5791bdcfa9c29238242fadc8d150d04b1df0d298802802c15e17f2f02e0a6e21fafbfbb1d055bad3280d7b135b57bad9e7e377af56de25d08a0083e12c863d686aab856f4d4c9c68e42f413f063ec0ced505d8323d1fe96ee4df3e7ecab0890d97efe6c9f4af82d7bf7e1165255fcc6ea37e7c010fa5aeb0a3c873a3366646d8479a2e43bb8e8674b0f2dfa5aebbff3f1ccaa091ee46179aad4fcddfcbd80c1290fabeee790f4b8acad554c591ccdc9857387a75e28567013a3605137fc1166092c4c516b90cd79a810b363db4aa3c6dd40ba7e2ff5c2b8fe03d11a5db47ddffa6ef6fd77e20336a1529e21e568b206876a75dcba280dbe8f20364f234b041829d496d4739f859f5a5912c6bddd8b5b47d14a1fb8784aec09dac5d13b24263a74f49ae1cbaa33cd1a9dfee0086e8b3c2d8563b3a918580af28094231d2f1a99eabf72b18f598fd850916f57119584669fef278f967d25375cb82d8d05f048800d16cc17e8a476916a611574a22c843fb78ba1a02f7fa37c6b20f3648fb7dfa63973d834abde0af3e4e599a33e02ee3eda168649d5e629542ece4874534dbf31c316d1bf33bcc29432489fc09ebc34872467f8f48bcdd6a1654732ac6cb31147fe4d518cca4671d7041ffa0b491a772674e57ce805dbe054a90957027b243c68e2de2385e99b6c18c63359a2ffbe214d1b2acffcf86bde4c4e96b61bf41925b8147c22c7f3c0e91b933105ee12de110be127d1f90647127c9ad722a606beb84e3b0918381187e3aa117e99f16cf493d1ed3ab5d455fdccb15255fa50f59650f011e93321ae0b7e9887f1f7cb086b6538d3fd2a413c13840c23aa027df36a0e79dfabbc222bcf90b78a5784baa203050a5f1a30442a68c09c82e9902855590e93df6736cea58b1cd5fd42e22919fb657e1460fedd929e2b1393fd23bc7b91d974d9827d7b2e9facb7a712e238d84f5a9c9210aa05913253b0d236208c6ba75d0e0622c4883f83fb4299565d84f26979fb8fd60d728725318c039b5a3d61ad880ba027c9b8a0fe333b63c703a1fe2b183e259ce7426a5b0516fdc3015650707f4a4cc709b79ded248ae9a3e31f38c1e2ab3bac2380f05a40fccf03924dea24342a382d794d99d3c0ba8d5e3afde0ba85859ef577382de440e1bdf288f7b5ead49e30d4383dc659346e03e077efb9a79ce85a97c5ed59bbba0dc8ce312b061c738f0d7ac1ade0b1b2ee554660c04b7ec5464b29cb749a66abaa924028cfdec83d79fefa0bfbfe6e35eb2a81c99896e0853c29431adfe6fd860f5691660f583495503d97127e2722668ba50354355200087963f11203e843d7096fd49fe83920cf67a35e3882ba17c3ce21f7aac2a8ffd71489b7d2f407e2f066739cbadd4cc20fa37f581ab94092191661ad4e88305fdc52222671af9eda4251f9ac4b66ffbd6ceb54f75c2b0f3cef475f8d83a0129507a3b245bb9585749e99c22c405fc24a19e0e88d38edd77221551cb90edb58515ab91fb5158f198a2869c3d460b6222d136863b27b60c399fd1715179578a5d727efb8f0d120a994a57304ca0c7bf8ef6fb1548d6fc9be32c75d3ecebc5409272864a6ef63d7f5033e5db577ec777f03ccf04f5351ed0c8e10bd193c4195c4729a1ab4b4ce51f9bb2f884124d2cf2ee7d0a7155c64c8db55961e015e5c7e6abd6d694d57e85e91ab2e9a25b78147af5079d82520233dd3890b5150e49f41eb3e3b2e71e3a262fb7ab446a7b210002bb793b68bc076787f14c8eda965b5d4d8a24024046e25bd577ba5bd139559ba2a09d4a5d49f91904f4b81f974ebe513a65a49ff0bff0ced5d62fdc17d7009ff476f931dc686cdfb1970b737f02fa142b94c4599c6f5ffc01308fe24f076e67088d06cfad0d96dc67d4cb58c30c7865ed14a6b39055b04e5cbd8a0eada166df5f9252174a6c2b87f1dde1f9f26e7e9353deb8a9b5d880e5013ff3f8650d10c96884d415092202cfdabb5cdbbabf075cd21f4995be5c68b8fc15d6fceaf9223f7809910dafeece284bb2e293368c9049c66cbc02b4eeb49ce7495535eec4289629aee4c7ae41f05c910448973d09677dcb664a6b501e094cda47f239da189b47e0a28b83a188ddf90c12165eec8714ab6e0a0e3bcf9a6905d7605242f8f1f651e196e027dbb26ec4cdfbdf75ac067cabbca228338a6e6a389e42644f1ce14c41e4465b1fd5d3481b70511211fc92842b2ef2e742cc5998ac5ee19d73ac4bb0cfe14b8efb4e1d1bf40522c2f5fc23eff26d055328f1142890ca0cfaebf287c3e860c4e25b03051760412ab1ff0786db6808af0c8e3ba62683de3ac67e1bb6747bb8f57dc73189675d5c245444c4f5fbc54f7d2f65115a7bf4687d42f81900cb697fa456d0d1e61375f19ce6474d6351ad9deb878d9dbd00d9c2950a12e0d65350d8bd67d24a8aea4f7f14be2922d98968289b342f36a47e70adc4e924efbbd0df6d07364e60853dda14bb53c3cc9e32f78e0a4436ceed6dfd95bf0a9a703ab30699eb15809195e6f7bb31c23357ddb8ddfdb76d75fd593857df7fe482d0241af6a0c33faa858da147702ef77a5e66d56bf5c7f9433d0ff977d31c967c8c1e9286e6a72d50fed3c11f9eaa70770907a8fe5a054dcf413179f06bc07e932e52bf92930b50b072eb2d2c85832b9239b0d9fd4d0563d21bf3d4ec377007c9d70825d0de02e1e8f6a885d81aeaad458115ca9f0f7c4e19379185688eeb06a34b335d0353564cdc73a837e2c933d505059166b97e2558e62681346f327bab94e9b442b03fef02d2fac844f2b6a48efc815e6aa72f90661dabcb6feb8f720d233732a3f1ecfdb03d513874592b099fa4e4f718a3ffb79df5abc93e39efebb73dbdefdeaa002017f4259d16b8b07852412600847a7256eec96e4532ce401067b0f78073e18be17f1bb6eeb6c95c2817228c38a1e65deb2e8fc98fd97b8f6268d293f9adb50e804b9acb1b090689e97a8304a1c90091f5e3fcea68d99980f0ec6868ff598a953a2c2982b0f546ec4b352a9aabfd7b34bb3edb1fdd24cc6eead2487386f2bd44a92538a6630e453e4982035b5c3453c2c644ad418e55e3b9b85e5a9131e4aceb9e789d3752868a8b50e103c73b25ca09a67e3ef09c3802efc41ec88cc87ac77d60815cec3de2769ae47bb31ac51c4b604b7d3e78204b232d7d22a9b3f5d9239cac5898a61229cc0fe3b7d11833f8f26f1b63c298cc2ddcd66e01b9a5af60974855886edbbe3e2fd6d63305a10e9c7b9588adb5b12677d94eba8a321779515c37da2939535895b1e3fe3a898a80e89c7dc011b5c0355e638e464d07dd5d170fee933a8f150669ee36e3263470c5f13cc052b71a8838199ec69483eabdb7a763eca7757492d05f94ca4223444521dc564103af2982ba08d5c6d1ce064fb5a29e3e7466c468c02594fb666431ae48f1e7853dec6348a0dae261d4c60e22eee21afbf016438103aef38e2a2f67623a303eb1396dbaceb043f14b0ae4105686cdb9d55a57f12a1ec8be851a56577966c5c8cce0339c4fc02a19e7a1ad53bb4095fb4d413474e6fef8660edac3a4bf7d95e9a0eac58f2a2b7ab7b81687030476374c48bcf7d76ad0aff610ab73064b0b69debca13caeef0f2d71ab816a1db9e4bfdc6b985aa77df6182d7dddb70c91822180ed9df7d404c3442424f02171bb2d72d5992efe63ee358e8a6c2eeb32fef60116c68b88e558534059daee20e4244f70f15cd846dcb89ff1ca1619d5aaeb42311ab9da70e4bac49f9fa431f31bc5b9036838c11f6517398364fddef35a3ef09bff8a6d042f54423cb4f76338f72b5bfe0068d1d8b87f51a764cbdb57caafebef740fdeed00ab5a9c2fe47b929867bbc4c579de62ef6ac4f72f3d80347ebc54020274143676ce4eea37a85863c9de6b240a71f219d9005e05686369a509aff09358c291ee76033ce2b21e6c3554d6a42980871887fce2b0b606089a1a4e3e2a4140f3c7fae873a3d29eba2e7400cec5d2e63f3efd29ecd185c856273485e2d62f1f27e9d7d3c7c91a45aaa0866a026ba5bd2c45369de72d905408dbc13aa5b420e1f1fcf096301b1164f86ee790e25f8d496c4ff964a49783162f0ef3c2f3c0ca067a098df8022f784084a14bec233c9e69f4e313c43d4f76829edfbb7e9bae5580284976df9b769c11ab4be5d1b755ff8a93c4fc1a36be3073971e98a9bc1c98be521feb60f199f06df84fc61581574edb1b855380d10aee667108bfd8ba441105c82807e5aa7299bd000b8683335ef34076dbd99f37f3e3e59d0c891212d053a9475e566279db41663d2977c7f8920a8f48d9d46f79b12f70dd4ed4978e06e3dbbaf4d256ac25a10110ecaa71d50ce3179b4ab825063c6158b91086ed66948d9fc772db4de917eb6c6a047af0c577d27c615b5dbed2c02f28206d4446e8975445a8f1d560c962e5486b8fdec6b0dc00699de9d45a67df1121106c74329b4b3e4aeaa9fee973d2092e989a2bada6b29c369ed5b00aee1a5df51d3caedd6f44bc8b06ecb8188881749a73bf5177ab0e83efae27ad641429000940967de3c7b86bc6151caa556d77170b61b802bcf82d0ef49699fba3ffe2630786cdf9b157b37208b68c6a0d4571aa929865238491bdac4ac6e78e1f1e2dd7979cf365c474cf5e7dae7b0b2ee173a7da48d604b46e10d0bb7b2016d5b4213f0c4295f427b3e7071a6d36d980c915e014eb6fe73b5252cb5cb91ce43d1aa354df82456a66c5d70f582cd1c18773f17309b01dda64588a9eff92e14cdbacef804ed50f0d2ae059d0940e50d160fab5734e9555c21aea1218db5e30eeb7108068ede286de1df1f21df33198d147fd3a7ecc50846c43f76e317d88e8d2eabaf99a5f56cd1f0d83d6d2c41f76a978d309600896a4a6b0481402e9d13d8a9f4618d67c7634faf62bccef74eb9ebddd80268df97727265f425402d8160f804eedf18e4719557af57cc33388fd2491fdd37823e8a9d2ba1deef61c66ebca51a75dbbf4487254e3bf33e73ed5943dc72996bb3f82e381c51d1a7359f141ab9541ec12e73ff8e07fc1d106cf23da6680076ea48e385c08aa757e01c322a0c0b6ab8ab77c521cab47a17f64589385c1028eafb46154ea09c99dc5b81885330671f87a57d610163a2fec34ab34e65de843c6b6ed56bd784dd705bdebe8186de3bf4b122a25509d69ec5020cdedd2d031869adcb28279d98df7b32ad409b83eeabdd8835e9238ddd671", ["", ""]}, 0xf10}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 09:45:08 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000d00, 0x4) 09:45:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000901, 0x4) 09:45:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000136, 0x4) [ 2444.256264][ T35] audit: type=1800 audit(1612431908.395:52609): pid=1020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14279 res=0 errno=0 09:45:08 executing program 1: syz_usb_connect$cdc_ncm(0x0, 0xef, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xdd, 0x2, 0x1, 0xec, 0x0, 0x8, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5, 0x24, 0x0, 0x5}, {0xd, 0x24, 0xf, 0x1, 0x6, 0x8000, 0x2, 0x1}, {0x6, 0x24, 0x1a, 0xf4bb, 0x8}, [@mbim={0xc, 0x24, 0x1b, 0x9, 0x3, 0x4, 0x81, 0x1f, 0x9}, @country_functional={0xa, 0x24, 0x7, 0x4, 0xe163, [0xffff, 0xf7fd]}, @mbim_extended={0x8, 0x24, 0x1c, 0x800, 0x6, 0x3}, @mdlm_detail={0x47, 0x24, 0x13, 0x2, "96c3769318f27906ffa57a96867054dce1c106d5883e6964a1750f54bf358a68a8b9d5ff4df632d329ab4970fd746c6957c52e588c77122cddb8f4ab8861bf96a1063e"}, @mdlm={0x15, 0x24, 0x12, 0x161}, @network_terminal={0x7, 0x24, 0xa, 0x80, 0x81, 0x56}]}, {{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x5, 0x40, 0xf9}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x9, 0x0, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x3, 0x8, 0x8}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x250, 0x4, 0x0, 0xf1, 0xff, 0x40}, 0x42, &(0x7f0000000140)={0x5, 0xf, 0x42, 0x4, [@wireless={0xb, 0x10, 0x1, 0x8, 0x82, 0x20, 0x6, 0x3f, 0x6}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x8, 0x81, 0xc5, 0x9}, @ss_container_id={0x14, 0x10, 0x4, 0xe, "07c01d932f9a03439670646a55929716"}, @ss_container_id={0x14, 0x10, 0x4, 0x2, "cc191b4c0cf11c93d504b11744f0c050"}]}, 0x2, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x419}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x427}}]}) ioctl$HIDIOCSFLAG(0xffffffffffffffff, 0x4004480f, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0)='mptcp_pm\x00') [ 2444.320005][T22656] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2444.325709][ T35] audit: type=1800 audit(1612431908.415:52610): pid=1037 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14304 res=0 errno=0 [ 2444.360167][T22656] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2444.573542][T22656] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2444.588055][T22656] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2444.634690][T22656] usb 5-1: Product: syz [ 2444.648902][T22656] usb 5-1: Manufacturer: syz [ 2444.663398][T22656] usb 5-1: SerialNumber: syz [ 2444.694881][T17625] usb 2-1: new high-speed USB device number 41 using dummy_hcd [ 2444.704080][ T1024] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 2444.933467][T17625] usb 2-1: Using ep0 maxpacket: 32 [ 2444.983464][T22656] cdc_ncm 5-1:1.0: bind() failure [ 2445.005584][T22656] cdc_ncm 5-1:1.1: bind() failure [ 2445.029973][ T35] audit: type=1800 audit(1612431909.165:52611): pid=1059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14303 res=0 errno=0 [ 2445.041114][T22656] usb 5-1: USB disconnect, device number 70 [ 2445.128268][ T35] audit: type=1800 audit(1612431909.265:52612): pid=1057 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14301 res=0 errno=0 [ 2445.150013][T17625] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 [ 2445.246116][ T35] audit: type=1800 audit(1612431909.385:52613): pid=1063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14304 res=0 errno=0 [ 2445.281678][ T35] audit: type=1800 audit(1612431909.415:52614): pid=1060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14302 res=0 errno=0 [ 2445.353858][T17625] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2445.363160][T17625] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2445.379720][T17625] usb 2-1: Product: syz [ 2445.386282][T17625] usb 2-1: Manufacturer: Ч [ 2445.393196][T17625] usb 2-1: SerialNumber: syz [ 2445.703444][T22656] usb 5-1: new full-speed USB device number 71 using dummy_hcd [ 2445.723543][T17625] cdc_ncm 2-1:1.0: bind() failure [ 2445.731660][T17625] cdc_ncm 2-1:1.1: bind() failure [ 2445.755515][T17625] usb 2-1: USB disconnect, device number 41 [ 2446.073549][T22656] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 2446.084661][T22656] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 2446.101310][T22656] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2446.113506][T22656] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2446.313395][T22656] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2446.322567][T22656] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2446.330588][T22656] usb 5-1: Product: syz [ 2446.335513][T22656] usb 5-1: Manufacturer: syz [ 2446.341095][T22656] usb 5-1: SerialNumber: syz [ 2446.364279][ T1024] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 2446.423335][ T5] usb 2-1: new high-speed USB device number 42 using dummy_hcd 09:45:10 executing program 4: bpf$BPF_TASK_FD_QUERY(0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 09:45:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000137, 0x4) 09:45:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000a00, 0x4) 09:45:10 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000f00, 0x4) 09:45:10 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000d01, 0x4) [ 2446.553380][T22656] cdc_ncm 5-1:1.0: bind() failure [ 2446.578135][T22656] cdc_ncm 5-1:1.1: bind() failure 09:45:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x578c}, 0x0) [ 2446.612332][T22656] usb 5-1: USB disconnect, device number 71 [ 2446.663301][ T5] usb 2-1: Using ep0 maxpacket: 32 09:45:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x16, 0x0, 0x0, 0x7f}, 0x40) 09:45:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x8, 0x0, 0x9effffff}, 0x0) 09:45:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) [ 2446.863304][ T5] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 09:45:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0xc04a01, 0x2347}, 0x0) 09:45:11 executing program 4: rt_sigaction(0xb, 0x0, 0x0, 0x8, &(0x7f00000013c0)) [ 2447.043326][ T5] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2447.059136][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2447.088111][ T5] usb 2-1: Product: syz [ 2447.106071][ T5] usb 2-1: Manufacturer: Ч [ 2447.129497][ T5] usb 2-1: SerialNumber: syz [ 2447.282168][ T35] audit: type=1800 audit(1612431911.415:52615): pid=1119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14302 res=0 errno=0 [ 2447.322225][ T35] audit: type=1800 audit(1612431911.455:52616): pid=1118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14303 res=0 errno=0 [ 2447.374735][ T35] audit: type=1800 audit(1612431911.455:52617): pid=1116 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:45:11 executing program 1: bpf$MAP_CREATE(0x5, &(0x7f0000000140), 0x40) 09:45:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x1, 0x2, &(0x7f00000003c0)=@raw=[@generic={0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000400)='GPL\x00', 0x3, 0xe0, &(0x7f0000000440)=""/224, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:11 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000138, 0x4) 09:45:11 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000f01, 0x4) 09:45:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000a01, 0x4) 09:45:11 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000e00, 0x4) 09:45:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000140)=0x4, 0x4) [ 2447.473290][ T5] cdc_ncm 2-1:1.0: bind() failure [ 2447.490156][ T5] cdc_ncm 2-1:1.1: bind() failure 09:45:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x1, 0x2, &(0x7f00000003c0)=@raw=[@generic={0x4, 0x0, 0xa}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000400)='GPL\x00', 0x3, 0xe0, &(0x7f0000000440)=""/224, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2447.528578][ T5] usb 2-1: USB disconnect, device number 42 09:45:11 executing program 1: timer_create(0x0, 0x0, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f00000001c0)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000005c0)={{}, {0x77359400}}, &(0x7f0000000600)) 09:45:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000100)=@framed={{0x18, 0xa}}, &(0x7f0000000400)='GPL\x00', 0x3, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:11 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, &(0x7f0000000100)={{0x2}}) 09:45:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd}, {0x9}, {0x0, 0x3}]}, @struct={0xa, 0x3, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}]}]}}, &(0x7f0000000240)=""/177, 0x6e, 0xb1, 0x1}, 0x20) 09:45:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x1c6}, 0x54) 09:45:12 executing program 1: syz_usb_connect$cdc_ncm(0x0, 0xa0, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x8e, 0x2, 0x1, 0xec, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x8000, 0x0, 0x1}, {0x6}, [@mbim={0xc, 0x24, 0x1b, 0x9, 0x3, 0x4, 0x81, 0x1f, 0x9}, @country_functional={0xa, 0x24, 0x7, 0x4, 0xe163, [0xffff, 0xf7fd]}, @mdlm={0x15}, @network_terminal={0x7, 0x24, 0xa, 0x0, 0x81}]}, {{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x5, 0x40, 0xf9}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x9, 0x0, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x3, 0x8, 0x8}}}}}}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x250, 0x4, 0x0, 0xf1, 0xff, 0x40}, 0x42, &(0x7f0000000140)={0x5, 0xf, 0x42, 0x4, [@wireless={0xb, 0x10, 0x1, 0x8, 0x82, 0x20, 0x6, 0x3f, 0x6}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x8, 0x81, 0xc5, 0x9}, @ss_container_id={0x14, 0x10, 0x4, 0xe, "07c01d932f9a03439670646a55929716"}, @ss_container_id={0x14, 0x10, 0x4, 0x2, "cc191b4c0cf11c93d504b11744f0c050"}]}, 0x2, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x419}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x427}}]}) syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0)='mptcp_pm\x00') 09:45:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000139, 0x4) [ 2448.153487][ T5] usb 2-1: new high-speed USB device number 43 using dummy_hcd 09:45:12 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001001, 0x4) 09:45:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r0, 0xc0104811, 0x0) 09:45:12 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000e01, 0x4) 09:45:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000b00, 0x4) 09:45:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0xd, 0x4) [ 2448.393126][ T5] usb 2-1: Using ep0 maxpacket: 32 09:45:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 09:45:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c000000010a"], 0x2c}}, 0x0) [ 2448.513925][ T5] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 09:45:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000080), 0x4) 09:45:12 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000100)=@framed={{}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f0000000400)='GPL\x00', 0x3, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x8000000000000000}, 0x300, 0x0, 0x9effffff}, 0x0) [ 2448.693483][ T5] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2448.702555][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2448.751526][ T5] usb 2-1: Product: syz [ 2448.772837][ T5] usb 2-1: Manufacturer: Ч [ 2448.790489][ T5] usb 2-1: SerialNumber: syz [ 2449.124176][ T35] kauditd_printk_skb: 7 callbacks suppressed [ 2449.124186][ T35] audit: type=1800 audit(1612431913.265:52625): pid=1214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14294 res=0 errno=0 [ 2449.133603][ T5] cdc_ncm 2-1:1.0: bind() failure [ 2449.206674][ T5] cdc_ncm 2-1:1.1: bind() failure [ 2449.219141][ T35] audit: type=1800 audit(1612431913.355:52626): pid=1218 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14295 res=0 errno=0 [ 2449.252450][ T5] usb 2-1: USB disconnect, device number 43 [ 2449.822988][ T5] usb 2-1: new high-speed USB device number 44 using dummy_hcd [ 2450.063006][ T5] usb 2-1: Using ep0 maxpacket: 32 [ 2450.183209][ T5] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 [ 2450.353423][ T5] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2450.362719][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2450.379476][ T5] usb 2-1: Product: syz [ 2450.383721][ T5] usb 2-1: Manufacturer: Ч [ 2450.388673][ T5] usb 2-1: SerialNumber: syz 09:45:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013a, 0x4) 09:45:14 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x9, 0x2, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:14 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001100, 0x4) 09:45:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000b01, 0x4) 09:45:14 executing program 1: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000180)={0x0, 0x0, 0x19, &(0x7f00000000c0)={0x5, 0xf, 0x19, 0x2, [@ss_cap={0xa}, @ss_cap={0xa}]}}) 09:45:14 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000f00, 0x4) 09:45:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x2, 0x3, 0x7, 0x8, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 2450.713013][ T5] cdc_ncm 2-1:1.0: bind() failure [ 2450.746073][ T5] cdc_ncm 2-1:1.1: bind() failure [ 2450.794547][ T5] usb 2-1: USB disconnect, device number 44 09:45:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) 09:45:15 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5452, 0x0) 09:45:15 executing program 4: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0), 0x8) 09:45:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x2, 0x3, 0x7, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x40) [ 2451.162849][ T5] usb 2-1: new high-speed USB device number 45 using dummy_hcd 09:45:15 executing program 4: rt_sigaction(0xb, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000013c0)) 09:45:15 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013b, 0x4) 09:45:15 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5460, 0x0) [ 2451.346031][ T35] audit: type=1800 audit(1612431915.485:52627): pid=1258 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14300 res=0 errno=0 [ 2451.410529][ T35] audit: type=1800 audit(1612431915.545:52628): pid=1262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14304 res=0 errno=0 [ 2451.431040][ T5] usb 2-1: Using ep0 maxpacket: 32 09:45:15 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001101, 0x4) 09:45:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000c00, 0x4) [ 2451.489456][ T35] audit: type=1800 audit(1612431915.595:52629): pid=1257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2451.526637][ T35] audit: type=1800 audit(1612431915.625:52630): pid=1259 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14299 res=0 errno=0 [ 2451.642926][ T5] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2451.665329][ T5] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2451.695344][ T5] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2451.720514][ T5] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 2451.746261][ T5] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2451.771464][ T5] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 2451.953249][ T5] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2451.962305][ T5] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2451.992093][ T5] usb 2-1: Product: syz [ 2452.006413][ T5] usb 2-1: Manufacturer: syz [ 2452.012239][ T5] usb 2-1: SerialNumber: syz [ 2452.028603][ T35] audit: type=1800 audit(1612431916.165:52631): pid=1300 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14291 res=0 errno=0 [ 2452.090913][ T35] audit: type=1800 audit(1612431916.225:52632): pid=1296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14286 res=0 errno=0 [ 2452.246747][ T35] audit: type=1800 audit(1612431916.385:52633): pid=1305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14294 res=0 errno=0 [ 2452.302790][ T5] cdc_ncm 2-1:1.0: bind() failure [ 2452.310578][ T5] cdc_ncm 2-1:1.1: bind() failure [ 2452.335452][ T5] usb 2-1: USB disconnect, device number 45 [ 2453.042715][T17625] usb 2-1: new high-speed USB device number 46 using dummy_hcd [ 2453.282753][T17625] usb 2-1: Using ep0 maxpacket: 32 [ 2453.482933][T17625] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2453.493853][T17625] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2453.511238][T17625] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2453.525221][T17625] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 2453.539097][T17625] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2453.552893][T17625] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 09:45:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x1, 0x2, &(0x7f00000003c0)=@raw=[@generic={0x7}, @jmp={0x5, 0x0, 0x9}], &(0x7f0000000400)='GPL\x00', 0x3, 0xe0, &(0x7f0000000440)=""/224, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:17 executing program 4: bpf$MAP_CREATE(0x9, &(0x7f0000000140), 0x40) 09:45:17 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000f01, 0x4) 09:45:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000c01, 0x4) 09:45:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013c, 0x4) 09:45:17 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001200, 0x4) 09:45:17 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x80) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 09:45:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f00000001c0)=""/244, 0x26, 0xf4, 0x1}, 0x20) [ 2453.742670][T17625] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2453.767802][T17625] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2453.817260][T17625] usb 2-1: Product: syz 09:45:18 executing program 1: r0 = syz_usb_connect$cdc_ncm(0x2, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x6, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff}}}}}}}]}}, &(0x7f0000000180)={0xa, &(0x7f0000000080)={0xa}, 0x19, &(0x7f00000000c0)={0x5, 0xf, 0x19, 0x2, [@ss_cap={0xa}, @ss_cap={0xa}]}}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000240)={0x14, 0x0, &(0x7f0000000200)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) [ 2453.862602][T17625] usb 2-1: can't set config #1, error -71 [ 2453.891439][T17625] usb 2-1: USB disconnect, device number 46 09:45:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x3, 0x782}]}]}}, &(0x7f00000001c0)=""/244, 0x32, 0xf4, 0x1}, 0x20) 09:45:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x4e2}, 0x40) 09:45:18 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000100)=@framed={{}, [@ldst={0x5, 0x0, 0x1}]}, &(0x7f0000000400)='GPL\x00', 0x3, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000001040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, 0x0) 09:45:18 executing program 4: syz_usb_connect(0x0, 0x24, &(0x7f00000025c0)={{0x12, 0x1, 0x0, 0xcd, 0xe4, 0xd7, 0x40, 0xb48, 0x1006, 0x825f, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x7, 0x0, 0x70, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2a, 0xc2, 0xb5}}]}}]}}, 0x0) [ 2454.324190][T17625] usb 2-1: new full-speed USB device number 47 using dummy_hcd [ 2454.402550][ T35] audit: type=1800 audit(1612431918.536:52634): pid=1337 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14301 res=0 errno=0 [ 2454.489469][ T35] audit: type=1800 audit(1612431918.626:52635): pid=1334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14299 res=0 errno=0 [ 2454.512550][T19313] usb 5-1: new high-speed USB device number 72 using dummy_hcd 09:45:18 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001001, 0x4) 09:45:18 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001201, 0x4) 09:45:18 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013d, 0x4) 09:45:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000d00, 0x4) [ 2454.540505][ T35] audit: type=1800 audit(1612431918.666:52636): pid=1333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14292 res=0 errno=0 [ 2454.601739][ T35] audit: type=1800 audit(1612431918.676:52637): pid=1336 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14300 res=0 errno=0 [ 2454.782816][T17625] usb 2-1: not running at top speed; connect to a high speed hub [ 2454.873024][T17625] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 2454.894906][T17625] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2454.926130][T17625] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 1023, setting to 64 [ 2454.962071][T17625] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2455.073893][T19313] usb 5-1: New USB device found, idVendor=0b48, idProduct=1006, bcdDevice=82.5f [ 2455.094257][T19313] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2455.125086][T19313] usb 5-1: Product: syz [ 2455.153914][T19313] usb 5-1: Manufacturer: syz [ 2455.168818][T17625] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2455.178234][T19313] usb 5-1: SerialNumber: syz [ 2455.190539][T17625] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2455.200355][T17625] usb 2-1: Product: syz [ 2455.216078][T17625] usb 2-1: Manufacturer: syz [ 2455.240790][T17625] usb 2-1: SerialNumber: syz [ 2455.247800][T19313] ttusb_dec_send_command: command bulk message failed: error -22 [ 2455.255801][ T35] audit: type=1800 audit(1612431919.396:52638): pid=1373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14281 res=0 errno=0 [ 2455.284671][T19313] ttusb-dec: probe of 5-1:7.0 failed with error -22 09:45:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013e, 0x4) 09:45:19 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001100, 0x4) [ 2455.340654][ T35] audit: type=1800 audit(1612431919.476:52639): pid=1377 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 [ 2455.448826][T19313] usb 5-1: USB disconnect, device number 72 [ 2455.466119][ T35] audit: type=1800 audit(1612431919.606:52640): pid=1376 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 [ 2455.571944][ T35] audit: type=1800 audit(1612431919.706:52641): pid=1380 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14301 res=0 errno=0 [ 2455.772445][T17625] cdc_ncm 2-1:1.0: bind() failure [ 2455.791826][T17625] cdc_ncm 2-1:1.1: bind() failure [ 2455.811610][T17625] usb 2-1: USB disconnect, device number 47 [ 2455.901525][ T35] audit: type=1800 audit(1612431920.036:52642): pid=1396 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14282 res=0 errno=0 [ 2456.004861][ T35] audit: type=1800 audit(1612431920.146:52643): pid=1407 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14292 res=0 errno=0 [ 2456.212374][T19313] usb 5-1: new high-speed USB device number 73 using dummy_hcd [ 2456.522361][T22656] usb 2-1: new full-speed USB device number 48 using dummy_hcd [ 2456.732366][T19313] usb 5-1: New USB device found, idVendor=0b48, idProduct=1006, bcdDevice=82.5f [ 2456.741699][T19313] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2456.757499][T19313] usb 5-1: Product: syz [ 2456.761671][T19313] usb 5-1: Manufacturer: syz [ 2456.773110][T19313] usb 5-1: SerialNumber: syz [ 2456.814042][T19313] ttusb_dec_send_command: command bulk message failed: error -22 [ 2456.821905][T19313] ttusb-dec: probe of 5-1:7.0 failed with error -22 [ 2456.952390][T22656] usb 2-1: not running at top speed; connect to a high speed hub 09:45:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc) 09:45:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000d01, 0x4) 09:45:21 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001300, 0x4) 09:45:21 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013f, 0x4) 09:45:21 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001101, 0x4) 09:45:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5}, 0x40) [ 2457.022667][T19313] usb 5-1: USB disconnect, device number 73 [ 2457.042376][T22656] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 2457.053524][T22656] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2457.070339][T22656] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 1023, setting to 64 09:45:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x7}, 0x40) 09:45:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0x6, 0x801}, 0x14}}, 0x0) [ 2457.122944][T22656] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 09:45:21 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x73, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x61, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@obex={0x5}]}, {{0x9, 0x5, 0x81, 0x3, 0x400, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8}}, {{0x9, 0x5, 0x3, 0x2, 0x10}}}}}}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f00000001c0)=@lang_id={0x4}}, {0x2, &(0x7f0000000280)=@string={0x2}}]}) [ 2457.202286][T22656] usb 2-1: string descriptor 0 read error: -71 [ 2457.209168][T22656] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 09:45:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2457.266511][T22656] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2457.312254][T22656] usb 2-1: can't set config #1, error -71 [ 2457.328974][T22656] usb 2-1: USB disconnect, device number 48 09:45:21 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x13, r0, 0x10000000) 09:45:21 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xa2, &(0x7f0000000100)=""/162, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) 09:45:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x0, 0x0, 0x0, 0xe0c}, 0x40) [ 2457.582261][T19313] usb 5-1: new high-speed USB device number 74 using dummy_hcd 09:45:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000e00, 0x4) [ 2457.862230][T19313] usb 5-1: Using ep0 maxpacket: 8 09:45:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x11, 0x0, &(0x7f0000000100)) 09:45:22 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001200, 0x4) 09:45:22 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001301, 0x4) 09:45:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000140, 0x4) 09:45:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x7}, 0x40) 09:45:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x8, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2458.002403][T19313] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 [ 2458.028296][T19313] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 16 [ 2458.253698][T19313] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2458.270588][T19313] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2458.298317][T19313] usb 5-1: Product: syz [ 2458.311337][T19313] usb 5-1: SerialNumber: syz [ 2458.602199][T19313] cdc_ncm 5-1:1.0: bind() failure [ 2458.630675][T19313] cdc_ncm 5-1:1.1: bind() failure [ 2458.654602][T19313] usb 5-1: USB disconnect, device number 74 [ 2459.332061][T22656] usb 5-1: new high-speed USB device number 75 using dummy_hcd [ 2459.572049][T22656] usb 5-1: Using ep0 maxpacket: 8 [ 2459.692193][T22656] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 [ 2459.701963][T22656] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 16 [ 2459.872138][T22656] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2459.881336][T22656] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2459.890860][T22656] usb 5-1: Product: syz [ 2459.896561][T22656] usb 5-1: SerialNumber: syz 09:45:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x4000}, 0x0) 09:45:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="97"], 0x40}}, 0x0) 09:45:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000e01, 0x4) 09:45:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000141, 0x4) 09:45:24 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001201, 0x4) 09:45:24 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001400, 0x4) [ 2460.181990][T22656] cdc_ncm 5-1:1.0: bind() failure 09:45:24 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='ro\x00', 0x0, 0x0) [ 2460.211032][T22656] cdc_ncm 5-1:1.1: bind() failure 09:45:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2460.253792][T22656] usb 5-1: USB disconnect, device number 75 09:45:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001200)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 09:45:24 executing program 4: socketpair(0x10, 0x0, 0x0, &(0x7f0000000280)) 09:45:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x0, 0x1c6}, 0x40) 09:45:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x3, &(0x7f0000000000)=@raw=[@initr0, @ldst={0x3, 0x0, 0x3}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:24 executing program 1: socketpair(0xa, 0x3, 0x5, &(0x7f0000000040)) 09:45:24 executing program 4: r0 = syz_usb_connect$cdc_ncm(0x2, 0x6e, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x6, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, &(0x7f0000000180)={0xa, &(0x7f0000000080)={0xa}, 0x19, &(0x7f00000000c0)={0x5, 0xf, 0x19, 0x2, [@ss_cap={0xa}, @ss_cap={0xa}]}}) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000240)={0x14, 0x0, &(0x7f0000000200)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) 09:45:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000f00, 0x4) [ 2460.851937][ T35] kauditd_printk_skb: 8 callbacks suppressed [ 2460.852028][ T35] audit: type=1800 audit(1612431924.986:52652): pid=1533 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14298 res=0 errno=0 [ 2460.852750][ T19] usb 5-1: new full-speed USB device number 76 using dummy_hcd [ 2460.907668][ T35] audit: type=1800 audit(1612431925.046:52653): pid=1537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14303 res=0 errno=0 09:45:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="aa2a254e203e17d5b3d036d71737e88f", 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="e51b9a53392769b42c2f6c1549ef8738", 0x10) 09:45:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000142, 0x4) [ 2460.958207][ T35] audit: type=1800 audit(1612431925.096:52654): pid=1535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14304 res=0 errno=0 [ 2461.059202][ T35] audit: type=1800 audit(1612431925.196:52655): pid=1536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:45:25 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001401, 0x4) 09:45:25 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001300, 0x4) 09:45:25 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x187400, 0x0) 09:45:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x6, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f0e}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @ldst={0x5, 0x0, 0x1}]}, &(0x7f0000000400)='GPL\x00', 0x3, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x0, 0x0, 0x6d33}, 0x40) 09:45:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000100)=@framed={{}, [@ldst={0x7}]}, &(0x7f0000000400)='GPL\x00', 0x3, 0xec, &(0x7f0000000000)=""/236, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2461.373562][ T19] usb 5-1: not running at top speed; connect to a high speed hub 09:45:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f0000000240)=""/177, 0x3e, 0xb1, 0x1}, 0x20) [ 2461.463381][ T19] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 2461.487905][ T19] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 09:45:25 executing program 1: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x80, 0xe00) [ 2461.528804][ T19] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 2461.583942][ T19] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 2461.653846][ T35] audit: type=1800 audit(1612431925.796:52656): pid=1572 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14298 res=0 errno=0 [ 2461.807359][ T35] audit: type=1800 audit(1612431925.946:52657): pid=1579 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14280 res=0 errno=0 [ 2461.830355][ T19] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2461.842784][ T19] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2461.878838][ T19] usb 5-1: Product: syz [ 2461.887820][ T19] usb 5-1: Manufacturer: syz [ 2461.897930][ T19] usb 5-1: SerialNumber: syz [ 2461.911744][ T35] audit: type=1800 audit(1612431926.046:52658): pid=1584 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14300 res=0 errno=0 [ 2461.949646][ T35] audit: type=1800 audit(1612431926.086:52659): pid=1590 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14304 res=0 errno=0 [ 2462.421817][ T19] cdc_ncm 5-1:1.0: bind() failure [ 2462.430451][ T19] cdc_ncm 5-1:1.1: bind() failure [ 2462.444359][ T19] usb 5-1: USB disconnect, device number 76 [ 2463.151721][ T5] usb 5-1: new full-speed USB device number 77 using dummy_hcd [ 2463.551696][ T5] usb 5-1: not running at top speed; connect to a high speed hub [ 2463.631862][ T5] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 2463.642972][ T5] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2463.660191][ T5] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 09:45:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xd}, {0x9}, {0x0, 0x3}]}, @struct={0x0, 0x3, 0x0, 0x4, 0x0, 0x0, [{0x8}, {}, {}]}]}}, &(0x7f0000000240)=""/177, 0x6e, 0xb1, 0x1}, 0x20) 09:45:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x1, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x200}, [@call={0x85, 0x0, 0x0, 0x2}]}, &(0x7f0000000400)='GPL\x00', 0x3, 0xe0, &(0x7f0000000440)=""/224, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000f01, 0x4) 09:45:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000143, 0x4) 09:45:27 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001500, 0x4) 09:45:27 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001301, 0x4) [ 2463.673951][ T5] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 09:45:27 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, 0x0) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 09:45:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_rxfh_indir}) [ 2463.733298][ T5] usb 5-1: string descriptor 0 read error: -71 [ 2463.741145][ T5] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2463.763217][ T5] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2463.801622][ T5] usb 5-1: can't set config #1, error -71 [ 2463.815881][ T5] usb 5-1: USB disconnect, device number 77 09:45:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}}, 0x0) 09:45:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x8}}) 09:45:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140)='V', 0x1}], 0x2}}], 0x1, 0x0) 09:45:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x41]}}, &(0x7f00000000c0)=""/197, 0x31, 0xc5, 0x1}, 0x20) 09:45:28 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000001500)={0x38}, 0x38}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x40002160, &(0x7f0000000b00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x80) 09:45:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001001, 0x4) 09:45:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@private2, @mcast1, @remote, 0x0, 0x8001}) [ 2464.429754][ T35] audit: type=1800 audit(1612431928.567:52660): pid=1634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14304 res=0 errno=0 09:45:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000144, 0x4) [ 2464.536865][ T35] audit: type=1800 audit(1612431928.677:52661): pid=1631 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:45:28 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001501, 0x4) 09:45:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x7}}) 09:45:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3a, &(0x7f0000000000)={@private0}, 0x20) 09:45:28 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001400, 0x4) 09:45:28 executing program 4: syz_emit_ethernet(0x30, &(0x7f0000000140)={@link_local, @random="a8b38d8a71b3", @val={@void}, {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@random, @random="924ff960002c"}, {@broadcast, @current}}}}}, 0x0) 09:45:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000003b00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="d823"], 0xd8}}], 0x2, 0x0) 09:45:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)={0x60, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) 09:45:29 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) accept$alg(r0, 0x0, 0x0) 09:45:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x5, &(0x7f0000000000)=@framed={{}, [@map_val]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x34}}) 09:45:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 09:45:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000145, 0x4) 09:45:29 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001600, 0x4) 09:45:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001100, 0x4) 09:45:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8921, &(0x7f0000000040)={'syz_tun\x00', 0x0}) 09:45:29 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001401, 0x4) 09:45:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000026c0)=[{{&(0x7f0000001540)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1400000000000000290000004300000017f5"], 0x18}}], 0x2, 0x0) 09:45:29 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000001500)={0x38}, 0x38}}, 0x0) recvfrom(r0, 0x0, 0x0, 0x40002160, 0x0, 0x0) 09:45:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000900)) 09:45:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x6cc, &(0x7f0000000080)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "a11bf26daa76cb9cb05102255b70fcaee53e444db6dddc5e7ea346a4cca072ca613d70987b9b84ff3b685db3b8f0860ea5b38b42440debdb8bd441c9224a53d3136428fa179b033742a70f086361607c"}, 0xd8) 09:45:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mtu(r0, 0x0, 0x4, 0x0, &(0x7f0000000080)) 09:45:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x7}, 0xc, &(0x7f0000000180)={0x0, 0xffffff7f00000000}}, 0x0) 09:45:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x28}}, 0x0) 09:45:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000146, 0x4) [ 2466.031427][ T35] kauditd_printk_skb: 4 callbacks suppressed [ 2466.031439][ T35] audit: type=1800 audit(1612431930.167:52666): pid=1708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14282 res=0 errno=0 09:45:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x2}}) [ 2466.102198][ T35] audit: type=1800 audit(1612431930.227:52667): pid=1724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 [ 2466.166986][ T35] audit: type=1800 audit(1612431930.307:52668): pid=1715 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:45:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001101, 0x4) 09:45:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) sendmmsg$inet6(r0, &(0x7f00000004c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0xffd8) 09:45:30 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001500, 0x4) 09:45:30 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001601, 0x4) 09:45:30 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) sendmmsg$inet6(r0, &(0x7f00000004c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=[@hoplimit={{0x14, 0x29, 0x3e}}], 0x18}}], 0x1, 0x0) 09:45:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "a11bf26daa76cb9cb05102255b70fcaee53e444db6dddc5e7ea346a4cca072ca613d70987b9b84ff3b685db3b8f0860ea5b38b42440debdb8bd441c9224a53d3136428fa179b033742a70f086361607c"}, 0xd8) [ 2466.355156][ T35] audit: type=1800 audit(1612431930.497:52669): pid=1729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14287 res=0 errno=0 09:45:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 09:45:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={0x0}}, 0x0) 09:45:30 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x202860, 0x4) 09:45:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8913, &(0x7f0000000040)={'bond_slave_1\x00', 0x0}) 09:45:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000147, 0x4) 09:45:30 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x200000, 0x4) [ 2466.792528][ T35] audit: type=1800 audit(1612431930.937:52670): pid=1744 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14282 res=0 errno=0 09:45:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001200, 0x4) 09:45:31 executing program 4: bpf$BPF_GET_MAP_INFO(0xb, 0x0, 0x0) [ 2466.999281][ T35] audit: type=1800 audit(1612431931.137:52671): pid=1753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14291 res=0 errno=0 [ 2467.114548][ T35] audit: type=1800 audit(1612431931.257:52672): pid=1759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:45:31 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001501, 0x4) 09:45:31 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x200000, 0x4) 09:45:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000140)='V', 0x1}], 0x1}}], 0x1, 0x0) 09:45:31 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001700, 0x4) [ 2467.244763][ T35] audit: type=1800 audit(1612431931.387:52673): pid=1770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:45:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000400), 0x8) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000001440)) 09:45:31 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x200000, 0x4) 09:45:31 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x200000, 0x4) 09:45:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:45:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000148, 0x4) 09:45:31 executing program 1: syz_genetlink_get_family_id$net_dm(0xffffffffffffffff) [ 2467.629351][ T35] audit: type=1800 audit(1612431931.767:52674): pid=1781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14282 res=0 errno=0 09:45:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001201, 0x4) 09:45:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) [ 2467.727013][ T35] audit: type=1800 audit(1612431931.867:52675): pid=1787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:45:32 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x2, &(0x7f0000000000)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 09:45:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000005200)=[{{&(0x7f0000001540)={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x1}, 0x1c, 0x0}}], 0x1, 0x0) 09:45:32 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001600, 0x4) 09:45:32 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001701, 0x4) 09:45:32 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8) sendmmsg$inet6(r0, &(0x7f00000004c0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x2}, 0x1c, 0x0}}], 0x1, 0x0) 09:45:32 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x7800) 09:45:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x200001b4}}, 0x0) 09:45:32 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x5452, &(0x7f0000000040)={@mcast2}) 09:45:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000149, 0x4) 09:45:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000026c0)=[{{&(0x7f0000001540)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="14"], 0x18}}], 0x2, 0x0) 09:45:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x6c8, &(0x7f0000000080)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "a11bf26daa76cb9cb05102255b70fcaee53e444db6dddc5e7ea346a4cca072ca613d70987b9b84ff3b685db3b8f0860ea5b38b42440debdb8bd441c9224a53d3136428fa179b033742a70f086361607c"}, 0xd8) 09:45:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001300, 0x4) 09:45:32 executing program 4: socketpair(0x25, 0x3, 0x3, &(0x7f0000000040)) 09:45:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:33 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001601, 0x4) 09:45:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000780)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c, 0x0}}], 0x1, 0x20000800) 09:45:33 executing program 4: bpf$BPF_GET_MAP_INFO(0x1e, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 09:45:33 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001800, 0x4) 09:45:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x4020940d, &(0x7f00000000c0)={@mcast2, @mcast2, @mcast1}) 09:45:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000780)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c, 0x0}}], 0x1, 0x20000800) 09:45:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014a, 0x4) 09:45:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000780)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c, 0x0}}], 0x1, 0x20000800) 09:45:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x7}, 0xfffffce0, &(0x7f0000000180)={0x0, 0x24}}, 0x0) 09:45:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001301, 0x4) 09:45:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000780)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c, 0x0}}], 0x1, 0x20000800) 09:45:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'veth0_to_bond\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 09:45:34 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001700, 0x4) 09:45:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8943, &(0x7f0000000040)={'syz_tun\x00', 0x0}) 09:45:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x6, 0x6c6, &(0x7f0000000000)={@private0}, 0x20) 09:45:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014b, 0x4) 09:45:34 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001801, 0x4) 09:45:34 executing program 1: socket(0x0, 0xfad1b167c43129a2, 0x0) 09:45:34 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmmsg$inet(r0, &(0x7f0000004100)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000280)="e7", 0x1}, {&(0x7f00000000c0)="97", 0x1}], 0x3}}], 0x1, 0x0) 09:45:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001400, 0x4) 09:45:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={&(0x7f0000001880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000001900)=""/207, 0x26, 0xcf, 0x1}, 0x20) 09:45:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpid() sendmsg$unix(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x18}, 0x0) 09:45:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1a, 0x0, 0x0) 09:45:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f00000023c0)={&(0x7f0000000080)=@newtfilter={0x1048, 0x2c, 0x0, 0x0, 0x0, {}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x1018, 0x2, [@TCA_BASIC_POLICE={0x1014, 0x4, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, 0x68, 0x3, 0x7, 0xc6a, 0x0, 0x0, 0xffffff51, 0x5, 0x1, 0x1, 0x5527]}, @TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfd, 0x9, 0x5, 0x3000000, 0x5, 0x10000, 0x1, 0x8, 0x400, 0x1000, 0x183e0550, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x3, 0x0, 0x8, 0x6, 0x0, 0x1ff, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x4, 0x80000000, 0x400, 0x0, 0x7ff, 0x2, 0x1, 0x3, 0x4, 0x39cc, 0x200, 0x3, 0x4, 0x6]}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x7]}]}]}}]}, 0x1048}}, 0x0) 09:45:34 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001701, 0x4) 09:45:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 09:45:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)={0x58, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x9}, {0x8}}}]}}]}, 0x58}}, 0x0) 09:45:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014c, 0x4) 09:45:34 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001900, 0x4) 09:45:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001401, 0x4) 09:45:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0xc020660b, 0x0) [ 2470.804566][ T1935] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 2470.838911][ T1935] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 09:45:35 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 2470.905880][ T1946] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 09:45:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x8, 0x0, 0x0) [ 2470.954585][ T1946] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 09:45:35 executing program 4: setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, 0x0, 0x0) 09:45:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) sendmmsg$inet6(r0, &(0x7f0000000280)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 09:45:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(r0, &(0x7f0000000140)=@in={0x2, 0x0, @multicast2}, 0x80) [ 2471.458403][ T35] kauditd_printk_skb: 16 callbacks suppressed [ 2471.458413][ T35] audit: type=1800 audit(1612431935.597:52692): pid=1937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14298 res=0 errno=0 [ 2471.548937][ T35] audit: type=1800 audit(1612431935.687:52693): pid=1939 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14280 res=0 errno=0 09:45:35 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000002240)=[{&(0x7f0000000000)="97848c49c74f6638166b3b42e4c2216070897f32d3e52a8bda9e09db545e857ba67f4564eb2bc5d7aeefef0bc56f1e2c6bd042ab7fabc210caa3b50b64943d1686ce65af246ef3b80b5176b89077e9f34f7a7cac468dd0f53a19d5ef855a0ebb8d39e6158839e44e9fa5b8021cb8b37ba3f011580aad25278e84eab914c0ae4584be8cc7511d88d88100e3664bb33ba27d5822c48cfbb690769a4623df5c52e0577859bf8744d34f88", 0xa9}, {&(0x7f00000001c0)="a5436021b264a372ba55c44414647422", 0x10}, {&(0x7f0000000240)="5e2fcce841e4dee3c4755ae1c8284bd431631470c3f22be9d2b2c4c16291416a3f2f4b9e199ffd96c1681490db1d225d0c5442e7b8b2bed1cb6161a2b384140fce341b208d31f45620797ff710b326ea1ef5ec1f211d75fa299eb6800bda5f34035666f0f4d5cc2fc1e1319e1ecec38cfe83dea1da0778b59eab7c8a9820a5766cb887004b7aebb4e678f8aceefa0e838a3e22624c27ba3f9f7caade2028ad895f23b6b9d53c45bd7f5d818f2befbf1ca9350f507f21596746848a44dea08846fafd2d2a4d75856a62fe3eb12c3524ad0e8ac315a6a3d15e6b17cf325ed7a84d89f3ad940f1be24575b7818a955a82f68f3dc68e38bbd2c98c8c079f69b1f4dc6b951e1e444c9cbc4a7a10245052ed8008037deedeb67db0772aeb05cad4071b038c50a4dfa809d681563f0e89b1f77a81aa6a8e82dcc15d074be74663c148ae38aa5dd63b17383a774aa6c58ddf49ebbdbe2426e6fd5021c2f0bb2a76bc7536b4c1aaf884b65b8c81f80365a579cd183f55cd1f816bbebf7e3c5ddee5ab9fb9c61859cd273416344310919213d104f31611718a1c042e6758d78951b79c2036120e28dc760cd5ffc35e0972303db1860a5f071c048877e73bd77f451c26a55093437b3330dc733abebedd4acb2374d7cfdb5a413b1a80e57914b3473e75a9ac7e003ba85fc791d6e0fd00acec9324f1a200c4a64cbfea35cca59da9551bdf4954c352c4550b627939b758e994fdbd1ef0f8389ea3c4816a484a1b912263e5202ed4c2a0fc83f01263992fccb57d254635fad32d91d77d3f384bdb234f07a73fd3d658f8961f03dbf319f02aa68574ac51aa64b39a802c9cae9a101408d042a71b89a6650bc4e114971cd28453c291a799c9316deaafa02e3e46b966f7e6e30d478bf3e7be7e02802793cc38fc0708ab0d08ff1180e506e195a4b3451627e0d2283132ffbb115a4fe0d7ce9a04dd863e2bfe2e49faec07fe9e79de144c8f71b4dc7050fbf1d1b839c86d769e14dfb3a4d371e5553aa99212e53b49756a719ae09057dba6bc27cf675e72c1a1414df934eaa06387cf1a0630528adc20d5991c841558b999e2927d69924e34c9981538897e6414d2e5af72a8fec3fb368a1d44b81b1d228513292fe36887fc47c64611f4aaf1e96944cde25c2932cc8ea35dcaaf3ae38fe349731cf2f6bad6707dd2fd367c9a6591b369e89068fab859dc9a62df4170c9a9ff373c7717bfbe6166f6514bab9878851c8975593e82229c585add9434ea6d1116f38521857d544218ee6064b8b11976c480db09cb0ed930f944b540556bdf3b29b81f7d2c3c6a40245f139d904d5718fd0c331d409c0144577a133b00d5f7b2ff567889f6a1df838d1aa7b10aaa8fd167b0913776264b5c49b49979bc2d3f0c8a51ddd52377cd5c466e65b0f201e1f8aaeb8e273fe7c3783d62830b43137dda94a51aca8f5cfc0c5e861f26e31c74be215a79b841129450f03e65cbcdf99744ae59e93166db0ec759fef51393765f5ea0940ea8f81cce3abd70f28ff4e6994930d6a4c35a2adfb821c84f6daffe89dca234a9e99894632c8c5d1b52facf5ebb9d16e32147c0e44d5799b952d7790e6d6e81a185c13251e1c44c167f1f6d3974090c9bd8f26d4fd81a7da1138e0718fee99332be6d60a0a44abf2d343b10a9b095c75bcf23bc3980b56ef007ebba1e79bc5555ce183d50731167072f2737b263dcde20ca3a12205507e821ad043243e161a084b7cfb007d66a7128ee3cfd924e4f6931b9ca425e4763525fa782bc3fc0f29033737ad6bce48427418de124009d0a053a6fff0d82c855c4a0ae0a715d77c69ba4b8436d70499cd03bfc9733186690d9944226b7b0a930a3e2393db24fd2ed416cce6db0507838f3df866a6f1c1b8570fc6c1ab9be1087b6a4dd30576e69643706f74d364ab4523e4c64c569976b6e209d3b37cd5dfb41c5e79ab60ea1446a0fbee1e542f76e6b9b51d56ffaff21979d640a0cbe7a1827d540c17109d77d41eb69c50bbffcf336e52cdbf61eeb61720686287843d11e7647f6aacea1a25d197d57c3cadc16151b184d3177b5641eb1f8cc6c8ed79eb66963b2b2c89fbcceec52385e4d5caf79afe57d5597714359d5e7c1093423f21fc5cbd6e0a0567456ce2b73fcc8a473588c1992b41361f86878110e5fafe417e04498c4d1db393cfea93d227b0b0152da4269ffa18401235dce3f249b5a23f1fe64448145a626057f1721110a687213f95dca1d9f667dbfda23ca178f453b0d97e79da4d1874c68c60714983b54de32fc720ac2e8f1ad31020f7f0196534a43a93a716430813a27b9c5e8d9de4ecb1e4e3aa790b4934d524f9d534125bdf309516c61aee54bce599fb6a5465d27dbf83888196435a70b530854e6aec3efeb771dbb8652dcd97ffa8d961bef1ebddc6f5d7c9299f0792d5c3f73fd9f9e84ae296dafd46b25ab8523d29f527e8e9fdfb8630280e2d1200114c5db872b2acc9c35c9f650f80c5daf702ded07a62f6ad4c83cdef30011f14907091d2afb96b8022429c67c207e6f32dbb4bdcee0279dff5728474bc7ec098d9c19dcca075c8e2c5659c2631603d3c7e285fd52f6f34b61fa5c6f8c33be42397555e848dbdb4cc7ba774bbc719f5ba53db16b563d9165021f91be292b85f588e972cc42839748d7a687c013b9cc594e25f89eb3384504c394df79756dfc6499a1b7935a2aff96fe754ef11ce1ce67e31f3f910a22afd50d6c41454ce7195467eadf10b2126117e5eb80ef2df7948d1674b83f5bddfcf93a9fc95b08ea184570ea68ae335727eb1ad7b122632c50fe1a71c64f32de84e07b1d950901a9da20aaa7ba70045d8b4c1af7df38434253dbf77f56b1444c36e9c88f6caf232bee2a4811e23373301e733bf33e84d59dcfb294a7218775edc572cf17404114ae9733d3508cad893b6ffe3bb6c18bfafd8f8cc55c896b142955b93da5063f40b9ad751721b76dbf5c2a173d80bf27456cd315b78f44815c45a37fc01f4691de718401530eb5c37ab6ed767ce2632a83fb06bf328793afeebd8f989ab1e8f0bfb43dcd7dabf337c24f9269f5c1f823fabb14236918b9d9a4649371aaf8d2190ebb484b26bd430aa89967eae2a554dfe91d6f65bd2ef1f3a8ee673f49e15e8bb115e842be18843741f130463ce3da3bc0386b536c2ab0508712a5f309681159b318c09d516a0f1a91579b78eacd8af6b8e6f4a9794a5d60b6628566455280f99d78ea5e2effd33c5f083c2161e64bf202ff056e24d6a7fd2292edfae29970d11ec517fc0ed31b1e261371749c3cc714ac3a591d57a6f0df2b17da4fb69fb9416ecc1e91a08a3810963ff5f1ee079c56374c175de6440ebf13eec6ffdf7a5fb227575e1c1cc0ad6e7cf2fea5a4e9e6c3b15ce0b6dc07cb84a4a153edcda52aaef26f04945c4b635eb74a4bbceff4744c06c38705b003a9462db69af36352318556b9fe4d98be0101b47fb15a2c22448e8aae17ee89d82999473aff6a0974647e0a6f13f84f2ffa337740363fe5d1a171447d6f3668b7b7386f86f5f3db1c5c50a8bd9d05f524bd0a7b87a8a368585a2e3a827fa3bd91fc1a3c402da9e52c13d6ded13b5c94585a107318796a52c541adf0320500d3e63f2e195c0176c12a4253dc1a4475588d84db554a7d08d294bcd3fd6ec4326ed5234dfdabf4ed913246c9be875b03c41117f53db664f44796d7fd83c2a71510f73b7d5dcd29be815ab6bf8226765f6fc87782f0326102f31efe3450f609f2c43e48225b4265cdbde42bfb714990b40769b455bf139f8fa38f3125ac81fcc9f0e5b778870c038862f533b406b4399e26687068a258ced773227977f229ceb5dddc405e4758ff717a72b323ff0faf6afc3e9ba35035b07c4c6d9fe779112e467fe2dfe9f107d8d1f0cec16126824bece25bee798701efebb5d33f560bbde0071daefe616f0ef9539c3a7269ea83cea661009ba4b3a42b104f3a0bfcf34e36f88b864c03fedb57c34cb051f2c3d975c419581e801f4aa33e599c66028c486eb0a009dd0cedfa3d8771e4ee70ecbe0c169d7ef0b5a59924debb1b29feafb331d54e2272cd58c21da946c78f75756d21d615e4339b8599ef8ba4cc4cb8bf87949b3617c69a14de2c449b63ef1cfa68f318c5df5c6f36cdb6020a85f9d736cb67e75bf848e06d9962562f5dd09ff1ca139d5429f54db87cfef290ff4c6b001d111fe3352883566957ae52d3d5a1ce5046eb768a4abc5145fea45a60356580e0c68c72c8c34044a4227e22771c91577da58a91e34096333cc3c8c6651bc825ae88fcef8ba21c3021f4533de7599610090b78c61fafb3e120682575e1c9fc170171577f8b9ae3dfb30e3585b3b8166c0746862886bac343351a3d94ed2295703210dd7bd0908d07153e7e5ab5ed0ec02a4d63d55d145993959ea5e0cb1329f26b61c9a799982cf5d243090bcef107d0eb10c52da833e5e6d22c6f6e877580a77b6ef5bc54124df7870fb0b6e62029d303fded28baf21be492e7ffd95736ed8bbf9b61eee92d5a1a2abb4834504eb75f91ce2cf972ed8596d18ea9ec065a546298e0239490a6531ae23b7f4d47bece91777d81e85ab818b5b86b4bcc50072697d8420b29beaca6feb612bc88855ca7af1195cdf5261d8253e434c60e539dc9135447966f495cc8a237c526bdf919217d5e4daf6460f44574fef96875b65e4bc0debfe855067df60be191e2972804c90cc76b6e961b2eeb1890305ba2249b31279a4dc668076fabca1b070b0c564f4918bc1ff2396a4a178ef700f3529a0cf8cca0316b11d3bf83678ce93ae05234fdacc012c3ca423e4cd021e3924316cbe55507e49b4c7aab32c13d957820bf7a385a1c40874ddbd432979ac5694d1ce9ad7241b49df606c7df15211a58e4c7c823ab97d538dfde9ed2f43e0976635d4ffe6a90661d4e6c3f4547b47ad4717c7bd0c2836ff508c82b2cec096ddf4c9a007e562512b398aef5ccf7e2fd07aebc6d028e8bf008eb862ee274b5b81d41815d927216f8f0c63d068a1cb53a6323def38e9426f19bc065961544a02a562509641a3e8f7d30e48ce34aafccad4b3b4b582c9b07ca3573a0c2ce3c0a85ec43cd8d84a9d254dd36595b738f3a0f52d3bfb5f2afcd25dea9a99da3e88ee4cd70271f74f7a0b80f7edb867a39834a3ddbab311c02d719f78ac186a1a3cfb15e1ca94f4cfe1e18914e64261effdf566846fb2c37ec9c8d0d22063eef68db7b29664355ea6b6af9bc57de68db47d519201f3a2ba9d7c0a489fb0b5f5a75b4c7fa24f7f0ba8e0d617cd1770a94a53748144555641fea7b5694c6825126177423e85ce6fd234c30792c491a1623b3fcba23c66dc4d38153123a6e8acada5edfe2d65fe5a9f8c129ecdff118e1490d2ffdec6d9039bc234142f262b3c39d5baa5f276a7e335527744a852b66b9b1f77f20779de4d8f691bb10668b9da599031a17799c4371f005de13f4f41f47c1854f", 0xf37}], 0x3}, 0x0) recvmsg(r1, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001a40)=""/198, 0xc6}, {&(0x7f00000016c0)=""/171, 0xab}, {&(0x7f0000001b40)=""/225, 0xe1}], 0x3}, 0x0) 09:45:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000540), 0x0) 09:45:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014d, 0x4) 09:45:35 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001800, 0x4) 09:45:35 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001901, 0x4) 09:45:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001500, 0x4) [ 2471.597086][ T35] audit: type=1800 audit(1612431935.737:52694): pid=1951 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:45:35 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000002240)=[{&(0x7f0000000000)="97848c49c74f6638166b3b42e4c2216070897f32d3e52a8bda9e09db545e857ba67f4564eb2bc5d7aeefef0bc56f1e2c6bd042ab7fabc210caa3b50b64943d1686ce65af246ef3b80b5176b89077e9f34f7a7cac468dd0f53a19d5ef855a0ebb8d39e6158839e44e9fa5b8021cb8b37ba3f011580aad25278e84eab914c0ae4584be8cc7511d88d88100e3664bb33ba27d5822c48cfbb690769a4623df5c52e0577859bf8744d34f88", 0xa9}, {&(0x7f00000001c0)="a5436021b264a372ba55c44414647422", 0x10}, {&(0x7f0000000240)="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", 0xf37}], 0x3}, 0x0) recvmsg(r1, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001a40)=""/198, 0xc6}, {&(0x7f00000016c0)=""/171, 0xab}, {&(0x7f0000001b40)=""/225, 0xe1}], 0x3}, 0x0) 09:45:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x7, &(0x7f0000000000)=@framed={{}, [@map, @alu, @ldst]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 2471.701446][ T35] audit: type=1800 audit(1612431935.777:52695): pid=1934 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:45:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000540)="ec", 0x1) 09:45:35 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000002240)=[{&(0x7f0000000000)="97848c49c74f6638166b3b42e4c2216070897f32d3e52a8bda9e09db545e857ba67f4564eb2bc5d7aeefef0bc56f1e2c6bd042ab7fabc210caa3b50b64943d1686ce65af246ef3b80b5176b89077e9f34f7a7cac468dd0f53a19d5ef855a0ebb8d39e6158839e44e9fa5b8021cb8b37ba3f011580aad25278e84eab914c0ae4584be8cc7511d88d88100e3664bb33ba27d5822c48cfbb690769a4623df5c52e0577859bf8744d34f88", 0xa9}, {&(0x7f00000001c0)="a5436021b264a372ba55c44414647422", 0x10}, {&(0x7f0000000240)="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", 0xf37}], 0x3}, 0x0) recvmsg(r1, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001a40)=""/198, 0xc6}, {&(0x7f00000016c0)=""/171, 0xab}, {&(0x7f0000001b40)=""/225, 0xe1}], 0x3}, 0x0) 09:45:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mtu(r0, 0x88, 0xa, 0x0, &(0x7f0000000080)) 09:45:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000002240)=[{&(0x7f0000000000)="97848c49c74f6638166b3b42e4c2216070897f32d3e52a8bda9e09db545e857ba67f4564eb2bc5d7aeefef0bc56f1e2c6bd042ab7fabc210caa3b50b64943d1686ce65af246ef3b80b5176b89077e9f34f7a7cac468dd0f53a19d5ef855a0ebb8d39e6158839e44e9fa5b8021cb8b37ba3f011580aad25278e84eab914c0ae4584be8cc7511d88d88100e3664bb33ba27d5822c48cfbb690769a4623df5c52e0577859bf8744d34f88", 0xa9}, {&(0x7f00000001c0)="a5436021b264a372ba55c44414647422", 0x10}, {&(0x7f0000000240)="5e2fcce841e4dee3c4755ae1c8284bd431631470c3f22be9d2b2c4c16291416a3f2f4b9e199ffd96c1681490db1d225d0c5442e7b8b2bed1cb6161a2b384140fce341b208d31f45620797ff710b326ea1ef5ec1f211d75fa299eb6800bda5f34035666f0f4d5cc2fc1e1319e1ecec38cfe83dea1da0778b59eab7c8a9820a5766cb887004b7aebb4e678f8aceefa0e838a3e22624c27ba3f9f7caade2028ad895f23b6b9d53c45bd7f5d818f2befbf1ca9350f507f21596746848a44dea08846fafd2d2a4d75856a62fe3eb12c3524ad0e8ac315a6a3d15e6b17cf325ed7a84d89f3ad940f1be24575b7818a955a82f68f3dc68e38bbd2c98c8c079f69b1f4dc6b951e1e444c9cbc4a7a10245052ed8008037deedeb67db0772aeb05cad4071b038c50a4dfa809d681563f0e89b1f77a81aa6a8e82dcc15d074be74663c148ae38aa5dd63b17383a774aa6c58ddf49ebbdbe2426e6fd5021c2f0bb2a76bc7536b4c1aaf884b65b8c81f80365a579cd183f55cd1f816bbebf7e3c5ddee5ab9fb9c61859cd273416344310919213d104f31611718a1c042e6758d78951b79c2036120e28dc760cd5ffc35e0972303db1860a5f071c048877e73bd77f451c26a55093437b3330dc733abebedd4acb2374d7cfdb5a413b1a80e57914b3473e75a9ac7e003ba85fc791d6e0fd00acec9324f1a200c4a64cbfea35cca59da9551bdf4954c352c4550b627939b758e994fdbd1ef0f8389ea3c4816a484a1b912263e5202ed4c2a0fc83f01263992fccb57d254635fad32d91d77d3f384bdb234f07a73fd3d658f8961f03dbf319f02aa68574ac51aa64b39a802c9cae9a101408d042a71b89a6650bc4e114971cd28453c291a799c9316deaafa02e3e46b966f7e6e30d478bf3e7be7e02802793cc38fc0708ab0d08ff1180e506e195a4b3451627e0d2283132ffbb115a4fe0d7ce9a04dd863e2bfe2e49faec07fe9e79de144c8f71b4dc7050fbf1d1b839c86d769e14dfb3a4d371e5553aa99212e53b49756a719ae09057dba6bc27cf675e72c1a1414df934eaa06387cf1a0630528adc20d5991c841558b999e2927d69924e34c9981538897e6414d2e5af72a8fec3fb368a1d44b81b1d228513292fe36887fc47c64611f4aaf1e96944cde25c2932cc8ea35dcaaf3ae38fe349731cf2f6bad6707dd2fd367c9a6591b369e89068fab859dc9a62df4170c9a9ff373c7717bfbe6166f6514bab9878851c8975593e82229c585add9434ea6d1116f38521857d544218ee6064b8b11976c480db09cb0ed930f944b540556bdf3b29b81f7d2c3c6a40245f139d904d5718fd0c331d409c0144577a133b00d5f7b2ff567889f6a1df838d1aa7b10aaa8fd167b0913776264b5c49b49979bc2d3f0c8a51ddd52377cd5c466e65b0f201e1f8aaeb8e273fe7c3783d62830b43137dda94a51aca8f5cfc0c5e861f26e31c74be215a79b841129450f03e65cbcdf99744ae59e93166db0ec759fef51393765f5ea0940ea8f81cce3abd70f28ff4e6994930d6a4c35a2adfb821c84f6daffe89dca234a9e99894632c8c5d1b52facf5ebb9d16e32147c0e44d5799b952d7790e6d6e81a185c13251e1c44c167f1f6d3974090c9bd8f26d4fd81a7da1138e0718fee99332be6d60a0a44abf2d343b10a9b095c75bcf23bc3980b56ef007ebba1e79bc5555ce183d50731167072f2737b263dcde20ca3a12205507e821ad043243e161a084b7cfb007d66a7128ee3cfd924e4f6931b9ca425e4763525fa782bc3fc0f29033737ad6bce48427418de124009d0a053a6fff0d82c855c4a0ae0a715d77c69ba4b8436d70499cd03bfc9733186690d9944226b7b0a930a3e2393db24fd2ed416cce6db0507838f3df866a6f1c1b8570fc6c1ab9be1087b6a4dd30576e69643706f74d364ab4523e4c64c569976b6e209d3b37cd5dfb41c5e79ab60ea1446a0fbee1e542f76e6b9b51d56ffaff21979d640a0cbe7a1827d540c17109d77d41eb69c50bbffcf336e52cdbf61eeb61720686287843d11e7647f6aacea1a25d197d57c3cadc16151b184d3177b5641eb1f8cc6c8ed79eb66963b2b2c89fbcceec52385e4d5caf79afe57d5597714359d5e7c1093423f21fc5cbd6e0a0567456ce2b73fcc8a473588c1992b41361f86878110e5fafe417e04498c4d1db393cfea93d227b0b0152da4269ffa18401235dce3f249b5a23f1fe64448145a626057f1721110a687213f95dca1d9f667dbfda23ca178f453b0d97e79da4d1874c68c60714983b54de32fc720ac2e8f1ad31020f7f0196534a43a93a716430813a27b9c5e8d9de4ecb1e4e3aa790b4934d524f9d534125bdf309516c61aee54bce599fb6a5465d27dbf83888196435a70b530854e6aec3efeb771dbb8652dcd97ffa8d961bef1ebddc6f5d7c9299f0792d5c3f73fd9f9e84ae296dafd46b25ab8523d29f527e8e9fdfb8630280e2d1200114c5db872b2acc9c35c9f650f80c5daf702ded07a62f6ad4c83cdef30011f14907091d2afb96b8022429c67c207e6f32dbb4bdcee0279dff5728474bc7ec098d9c19dcca075c8e2c5659c2631603d3c7e285fd52f6f34b61fa5c6f8c33be42397555e848dbdb4cc7ba774bbc719f5ba53db16b563d9165021f91be292b85f588e972cc42839748d7a687c013b9cc594e25f89eb3384504c394df79756dfc6499a1b7935a2aff96fe754ef11ce1ce67e31f3f910a22afd50d6c41454ce7195467eadf10b2126117e5eb80ef2df7948d1674b83f5bddfcf93a9fc95b08ea184570ea68ae335727eb1ad7b122632c50fe1a71c64f32de84e07b1d950901a9da20aaa7ba70045d8b4c1af7df38434253dbf77f56b1444c36e9c88f6caf232bee2a4811e23373301e733bf33e84d59dcfb294a7218775edc572cf17404114ae9733d3508cad893b6ffe3bb6c18bfafd8f8cc55c896b142955b93da5063f40b9ad751721b76dbf5c2a173d80bf27456cd315b78f44815c45a37fc01f4691de718401530eb5c37ab6ed767ce2632a83fb06bf328793afeebd8f989ab1e8f0bfb43dcd7dabf337c24f9269f5c1f823fabb14236918b9d9a4649371aaf8d2190ebb484b26bd430aa89967eae2a554dfe91d6f65bd2ef1f3a8ee673f49e15e8bb115e842be18843741f130463ce3da3bc0386b536c2ab0508712a5f309681159b318c09d516a0f1a91579b78eacd8af6b8e6f4a9794a5d60b6628566455280f99d78ea5e2effd33c5f083c2161e64bf202ff056e24d6a7fd2292edfae29970d11ec517fc0ed31b1e261371749c3cc714ac3a591d57a6f0df2b17da4fb69fb9416ecc1e91a08a3810963ff5f1ee079c56374c175de6440ebf13eec6ffdf7a5fb227575e1c1cc0ad6e7cf2fea5a4e9e6c3b15ce0b6dc07cb84a4a153edcda52aaef26f04945c4b635eb74a4bbceff4744c06c38705b003a9462db69af36352318556b9fe4d98be0101b47fb15a2c22448e8aae17ee89d82999473aff6a0974647e0a6f13f84f2ffa337740363fe5d1a171447d6f3668b7b7386f86f5f3db1c5c50a8bd9d05f524bd0a7b87a8a368585a2e3a827fa3bd91fc1a3c402da9e52c13d6ded13b5c94585a107318796a52c541adf0320500d3e63f2e195c0176c12a4253dc1a4475588d84db554a7d08d294bcd3fd6ec4326ed5234dfdabf4ed913246c9be875b03c41117f53db664f44796d7fd83c2a71510f73b7d5dcd29be815ab6bf8226765f6fc87782f0326102f31efe3450f609f2c43e48225b4265cdbde42bfb714990b40769b455bf139f8fa38f3125ac81fcc9f0e5b778870c038862f533b406b4399e26687068a258ced773227977f229ceb5dddc405e4758ff717a72b323ff0faf6afc3e9ba35035b07c4c6d9fe779112e467fe2dfe9f107d8d1f0cec16126824bece25bee798701efebb5d33f560bbde0071daefe616f0ef9539c3a7269ea83cea661009ba4b3a42b104f3a0bfcf34e36f88b864c03fedb57c34cb051f2c3d975c419581e801f4aa33e599c66028c486eb0a009dd0cedfa3d8771e4ee70ecbe0c169d7ef0b5a59924debb1b29feafb331d54e2272cd58c21da946c78f75756d21d615e4339b8599ef8ba4cc4cb8bf87949b3617c69a14de2c449b63ef1cfa68f318c5df5c6f36cdb6020a85f9d736cb67e75bf848e06d9962562f5dd09ff1ca139d5429f54db87cfef290ff4c6b001d111fe3352883566957ae52d3d5a1ce5046eb768a4abc5145fea45a60356580e0c68c72c8c34044a4227e22771c91577da58a91e34096333cc3c8c6651bc825ae88fcef8ba21c3021f4533de7599610090b78c61fafb3e120682575e1c9fc170171577f8b9ae3dfb30e3585b3b8166c0746862886bac343351a3d94ed2295703210dd7bd0908d07153e7e5ab5ed0ec02a4d63d55d145993959ea5e0cb1329f26b61c9a799982cf5d243090bcef107d0eb10c52da833e5e6d22c6f6e877580a77b6ef5bc54124df7870fb0b6e62029d303fded28baf21be492e7ffd95736ed8bbf9b61eee92d5a1a2abb4834504eb75f91ce2cf972ed8596d18ea9ec065a546298e0239490a6531ae23b7f4d47bece91777d81e85ab818b5b86b4bcc50072697d8420b29beaca6feb612bc88855ca7af1195cdf5261d8253e434c60e539dc9135447966f495cc8a237c526bdf919217d5e4daf6460f44574fef96875b65e4bc0debfe855067df60be191e2972804c90cc76b6e961b2eeb1890305ba2249b31279a4dc668076fabca1b070b0c564f4918bc1ff2396a4a178ef700f3529a0cf8cca0316b11d3bf83678ce93ae05234fdacc012c3ca423e4cd021e3924316cbe55507e49b4c7aab32c13d957820bf7a385a1c40874ddbd432979ac5694d1ce9ad7241b49df606c7df15211a58e4c7c823ab97d538dfde9ed2f43e0976635d4ffe6a90661d4e6c3f4547b47ad4717c7bd0c2836ff508c82b2cec096ddf4c9a007e562512b398aef5ccf7e2fd07aebc6d028e8bf008eb862ee274b5b81d41815d927216f8f0c63d068a1cb53a6323def38e9426f19bc065961544a02a562509641a3e8f7d30e48ce34aafccad4b3b4b582c9b07ca3573a0c2ce3c0a85ec43cd8d84a9d254dd36595b738f3a0f52d3bfb5f2afcd25dea9a99da3e88ee4cd70271f74f7a0b80f7edb867a39834a3ddbab311c02d719f78ac186a1a3cfb15e1ca94f4cfe1e18914e64261effdf566846fb2c37ec9c8d0d22063eef68db7b29664355ea6b6af9bc57de68db47d519201f3a2ba9d7c0a489fb0b5f5a75b4c7fa24f7f0ba8e0d617cd1770a94a53748144555641fea7b5694c6825126177423e85ce6fd234c30792c491a1623b3fcba23c66dc4d38153123a6e8acada5edfe2d65fe5a9f8c129ecdff118e1490d2ffdec6d9039bc234142f262b3c39d5baa5f276a7e335527744a852b66b9b1f77f20779de4d8f691bb10668b9da599031a17799c4371f005de13f4f41f47c1854f", 0xf37}], 0x3}, 0x0) recvmsg(r1, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001a40)=""/198, 0xc6}, {&(0x7f00000016c0)=""/171, 0xab}, {&(0x7f0000001b40)=""/225, 0xe1}], 0x3}, 0x0) 09:45:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x6c2, &(0x7f0000000080)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "a11bf26daa76cb9cb05102255b70fcaee53e444db6dddc5e7ea346a4cca072ca613d70987b9b84ff3b685db3b8f0860ea5b38b42440debdb8bd441c9224a53d3136428fa179b033742a70f086361607c"}, 0xd8) 09:45:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0x14}, 0x7}, 0x0) 09:45:36 executing program 1: socket(0x10, 0x2, 0x7ff) [ 2472.390844][ T35] audit: type=1800 audit(1612431936.527:52696): pid=1971 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14298 res=0 errno=0 [ 2472.445113][ T35] audit: type=1800 audit(1612431936.557:52697): pid=1986 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14304 res=0 errno=0 [ 2472.493039][ T35] audit: type=1800 audit(1612431936.617:52698): pid=1978 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:45:36 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a00, 0x4) 09:45:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014e, 0x4) 09:45:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000001180)='id_legacy\x00', &(0x7f00000011c0)={'syz', 0x2}, &(0x7f0000001200)='keyring\x00', r0) keyctl$read(0xb, r0, &(0x7f0000002240)=""/4103, 0x1007) 09:45:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x5, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x5, 0x8b, &(0x7f00000000c0)=""/139, 0x0, 0xb, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:45:36 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001801, 0x4) 09:45:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001501, 0x4) [ 2472.580083][ T35] audit: type=1800 audit(1612431936.717:52699): pid=1980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14280 res=0 errno=0 09:45:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000005c780)={0x0, [], 0x0, "03b213d3089e26"}) 09:45:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x33, &(0x7f0000000000)={@private0}, 0x20) 09:45:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0xa}}) 09:45:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0xffffff7f}, 0x0) 09:45:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000e8ffffff0000f40f"], 0x28}}, 0x0) 09:45:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8932, &(0x7f0000000040)={'syz_tun\x00', 0x0}) [ 2472.805251][ T2031] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2472.853852][ T2034] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2473.270767][ T35] audit: type=1800 audit(1612431937.417:52700): pid=2029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14279 res=0 errno=0 [ 2473.353133][ T35] audit: type=1800 audit(1612431937.497:52701): pid=2016 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14302 res=0 errno=0 09:45:37 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a01, 0x4) 09:45:37 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) recvfrom(r0, 0x0, 0x0, 0x40002160, 0x0, 0x0) 09:45:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x8941, 0x0) 09:45:37 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001900, 0x4) 09:45:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001600, 0x4) 09:45:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014f, 0x4) 09:45:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000880)=[{{&(0x7f0000001540)={0xa, 0x4e20, 0x0, @local, 0x1}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast1, 0x3f}, 0x1c, 0x0}}], 0x2, 0x0) 09:45:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 09:45:37 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0)=ANY=[], &(0x7f0000001700)=0x8) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x102, &(0x7f0000000400)={r4}, &(0x7f00000004c0)=0x8) 09:45:37 executing program 4: open$dir(&(0x7f0000001240)='./file0\x00', 0x200, 0x0) 09:45:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000380)={0x10, 0x2}, 0x10) 09:45:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 09:45:38 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001b00, 0x4) 09:45:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x10, 0x2}, 0x10) 09:45:38 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x1c, 0x1c, 0x1}, 0x1c) 09:45:38 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001901, 0x4) 09:45:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001601, 0x4) 09:45:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000150, 0x4) 09:45:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) close(r0) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 09:45:38 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000000c0)="dc", 0x1}], 0x1}, 0x0) close(r0) 09:45:38 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x80, 0x0, 0x43, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40, 0x0, @perf_config_ext={0xffff, 0x6553}, 0xc04, 0x1000000000000001, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x0, 0x0, 0xffffffffffffffff, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x7f, 0x30, 0x3f, 0x9, 0x0, 0x3f, 0x601, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x0, @perf_bp={&(0x7f0000000240), 0xb}, 0x2140, 0x2, 0x7, 0x3, 0x5, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x7) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000001}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) close(r1) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000040)=0x2) r2 = gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x2, 0x80, 0x0, 0x0, 0x6, 0xf46, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6353749b0c6c6984, @perf_bp={&(0x7f0000000180), 0x8}, 0x410, 0x40, 0x4, 0x4, 0xfff, 0xffffff81, 0x6}, 0x0, 0x1, r3, 0x2) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x1, 0x6, 0x5, 0x7f, 0x0, 0xfffffffffffffff9, 0x1020, 0xa, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x820, 0x2, @perf_config_ext={0x1, 0x7}, 0x10, 0x3, 0xed53, 0x0, 0x7, 0x1, 0x8}, r2, 0xa, r4, 0x3) 09:45:38 executing program 4: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) syz_open_procfs$namespace(0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000003}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000040)=0x2) r1 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x1, 0x0, 0x0, 0x7f, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1}, 0x0, 0x3, 0xed53, 0x0, 0x0, 0x0, 0x8}, r1, 0xa, 0xffffffffffffffff, 0x0) 09:45:38 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41055, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:45:38 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000002c0)='[', 0x1}], 0x1}, 0x80085) 09:45:39 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001b01, 0x4) 09:45:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x894c, 0x0) 09:45:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001700, 0x4) 09:45:39 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a00, 0x4) 09:45:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000151, 0x4) 09:45:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5421, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:45:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000140)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000002240)=[{&(0x7f0000000000)="97848c49c74f6638166b3b42e4c2216070897f32d3e52a8bda9e09db545e857ba67f4564eb2bc5d7aeefef0bc56f1e2c6bd042ab7fabc210caa3b50b64943d1686ce65af246ef3b80b5176b89077e9f34f7a7cac468dd0f53a19d5ef855a0ebb8d39e6158839e44e9fa5b8021cb8b37ba3f011580aad25278e84eab914c0ae4584be8cc7511d88d88100e3664bb33ba27d5822c48cfbb690769a4623df5c52e0577859bf8744d34f88", 0xa9}, {&(0x7f00000001c0)="a5436021b264a372ba55c4441464", 0xe}, {&(0x7f0000000240)="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", 0xf39}], 0x3}, 0x0) 09:45:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5421, &(0x7f0000000040)={'syz_tun\x00', 0x0}) 09:45:39 executing program 1: mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 09:45:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700014f, 0x4) 09:45:39 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001901, 0x4) 09:45:40 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001c00, 0x4) 09:45:40 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a01, 0x4) 09:45:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001701, 0x4) 09:45:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000152, 0x4) 09:45:40 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a00, 0x4) 09:45:40 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a00, 0x4) [ 2476.990416][ T35] kauditd_printk_skb: 12 callbacks suppressed [ 2476.990428][ T35] audit: type=1800 audit(1612431941.128:52714): pid=2162 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:45:41 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001c01, 0x4) 09:45:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001800, 0x4) [ 2477.099580][ T35] audit: type=1800 audit(1612431941.238:52715): pid=2168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:45:41 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001b00, 0x4) 09:45:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000153, 0x4) 09:45:41 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001901, 0x4) 09:45:41 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a00, 0x4) [ 2478.117375][ T35] audit: type=1800 audit(1612431942.258:52716): pid=2184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:45:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001801, 0x4) 09:45:42 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001d00, 0x4) 09:45:42 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001b01, 0x4) 09:45:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000154, 0x4) 09:45:42 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001800, 0x4) 09:45:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001300, 0x4) 09:45:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001900, 0x4) [ 2479.195995][ T35] audit: type=1800 audit(1612431943.338:52717): pid=2225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:45:43 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001d01, 0x4) [ 2479.275302][ T35] audit: type=1800 audit(1612431943.418:52718): pid=2226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14292 res=0 errno=0 09:45:43 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001c00, 0x4) 09:45:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000155, 0x4) [ 2479.460172][ T35] audit: type=1800 audit(1612431943.598:52719): pid=2237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14302 res=0 errno=0 09:45:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001201, 0x4) 09:45:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000143, 0x4) 09:45:44 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001001, 0x4) 09:45:44 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001c01, 0x4) 09:45:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001901, 0x4) [ 2480.451803][ T35] audit: type=1800 audit(1612431944.598:52720): pid=2251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:45:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000156, 0x4) 09:45:44 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001e00, 0x4) 09:45:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000700, 0x4) 09:45:45 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000701, 0x4) 09:45:45 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001e01, 0x4) 09:45:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a00, 0x4) [ 2481.594477][ T35] audit: type=1800 audit(1612431945.738:52721): pid=2278 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14303 res=0 errno=0 09:45:45 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000157, 0x4) [ 2481.684192][ T35] audit: type=1800 audit(1612431945.808:52722): pid=2286 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:45:45 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001d00, 0x4) 09:45:45 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001c01, 0x4) 09:45:46 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000700, 0x4) 09:45:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000158, 0x4) [ 2482.639846][ T35] audit: type=1800 audit(1612431946.778:52723): pid=2302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:45:46 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001d01, 0x4) [ 2482.725224][ T35] audit: type=1800 audit(1612431946.868:52724): pid=2304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14302 res=0 errno=0 09:45:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a01, 0x4) 09:45:47 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001d00, 0x4) 09:45:47 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001f00, 0x4) 09:45:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000159, 0x4) [ 2483.591585][ T35] audit: type=1800 audit(1612431947.738:52725): pid=2318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14281 res=0 errno=0 09:45:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000124, 0x4) 09:45:48 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001f01, 0x4) [ 2483.813223][ T35] audit: type=1800 audit(1612431947.958:52726): pid=2326 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14293 res=0 errno=0 09:45:48 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001e00, 0x4) 09:45:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001b00, 0x4) 09:45:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000123, 0x4) 09:45:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700015a, 0x4) 09:45:48 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000201, 0x4) 09:45:49 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002000, 0x4) [ 2484.979633][ T35] audit: type=1800 audit(1612431949.108:52727): pid=2349 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:45:49 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001e01, 0x4) 09:45:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001b01, 0x4) 09:45:49 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000148, 0x4) 09:45:49 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000201, 0x4) 09:45:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700015b, 0x4) 09:45:50 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001f00, 0x4) 09:45:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000152, 0x4) 09:45:50 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002001, 0x4) 09:45:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001c00, 0x4) 09:45:50 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000140, 0x4) 09:45:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700015c, 0x4) [ 2487.212555][ T35] audit: type=1800 audit(1612431951.359:52728): pid=2397 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:45:51 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001f01, 0x4) 09:45:51 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002100, 0x4) 09:45:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000149, 0x4) 09:45:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001c01, 0x4) 09:45:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700015d, 0x4) [ 2487.751548][ T35] audit: type=1800 audit(1612431951.899:52729): pid=2413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:45:52 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000148, 0x4) 09:45:52 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002000, 0x4) 09:45:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000112, 0x4) 09:45:52 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002101, 0x4) 09:45:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001d00, 0x4) 09:45:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700015e, 0x4) 09:45:53 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000148, 0x4) 09:45:53 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000138, 0x4) 09:45:53 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002001, 0x4) 09:45:53 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002200, 0x4) 09:45:54 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013c, 0x4) 09:45:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001d01, 0x4) 09:45:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700015f, 0x4) 09:45:54 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000136, 0x4) 09:45:54 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002201, 0x4) [ 2490.565031][ T35] audit: type=1800 audit(1612431954.709:52730): pid=2470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14302 res=0 errno=0 09:45:54 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002100, 0x4) 09:45:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001e00, 0x4) 09:45:55 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700013c, 0x4) 09:45:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000160, 0x4) 09:45:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000102, 0x4) 09:45:55 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002101, 0x4) 09:45:56 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002300, 0x4) 09:45:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001e01, 0x4) 09:45:56 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002201, 0x4) [ 2491.917554][ T35] audit: type=1800 audit(1612431956.059:52731): pid=2502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14280 res=0 errno=0 09:45:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000161, 0x4) 09:45:57 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700012d, 0x4) 09:45:57 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000121, 0x4) 09:45:57 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002200, 0x4) 09:45:57 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001f00, 0x4) 09:45:57 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002301, 0x4) 09:45:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000162, 0x4) [ 2493.148902][ T35] audit: type=1800 audit(1612431957.289:52732): pid=2528 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14308 res=0 errno=0 09:45:58 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011f, 0x4) 09:45:58 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002201, 0x4) [ 2493.991472][ T35] audit: type=1800 audit(1612431958.139:52733): pid=2536 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:45:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e8, 0x4) 09:45:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001f01, 0x4) 09:45:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000163, 0x4) 09:45:58 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002400, 0x4) 09:45:59 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011f, 0x4) 09:45:59 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002300, 0x4) 09:45:59 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002201, 0x4) 09:45:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000164, 0x4) 09:45:59 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002401, 0x4) 09:45:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002000, 0x4) 09:46:00 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700011f, 0x4) 09:46:00 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002301, 0x4) 09:46:00 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010e, 0x4) 09:46:00 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010c, 0x4) 09:46:00 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002500, 0x4) 09:46:00 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002400, 0x4) 09:46:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000165, 0x4) 09:46:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002001, 0x4) 09:46:02 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000110, 0x4) 09:46:02 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002501, 0x4) 09:46:02 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002401, 0x4) 09:46:02 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010e, 0x4) 09:46:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000166, 0x4) 09:46:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002100, 0x4) 09:46:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000112, 0x4) 09:46:03 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002500, 0x4) [ 2498.977873][ T35] audit: type=1800 audit(1612431963.120:52734): pid=2639 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:46:03 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000167, 0x4) [ 2499.086262][ T35] audit: type=1800 audit(1612431963.230:52735): pid=2649 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14302 res=0 errno=0 09:46:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000112, 0x4) 09:46:03 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700010e, 0x4) 09:46:03 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002600, 0x4) 09:46:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002101, 0x4) 09:46:04 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000112, 0x4) 09:46:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000168, 0x4) 09:46:04 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002601, 0x4) [ 2500.232693][ T35] audit: type=1800 audit(1612431964.380:52736): pid=2671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14294 res=0 errno=0 09:46:04 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002501, 0x4) 09:46:04 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000104, 0x4) 09:46:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002200, 0x4) 09:46:05 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d6, 0x4) 09:46:05 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002600, 0x4) [ 2501.177584][ T35] audit: type=1800 audit(1612431965.320:52737): pid=2689 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:46:05 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000169, 0x4) [ 2501.251601][ T35] audit: type=1800 audit(1612431965.320:52738): pid=2690 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:46:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000106, 0x4) 09:46:05 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002700, 0x4) 09:46:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002201, 0x4) [ 2501.547148][ T35] audit: type=1800 audit(1612431965.690:52739): pid=2702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14308 res=0 errno=0 09:46:06 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fe, 0x4) 09:46:06 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002601, 0x4) [ 2502.266076][ T35] audit: type=1800 audit(1612431966.410:52740): pid=2712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:46:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700016a, 0x4) 09:46:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002300, 0x4) [ 2502.544770][ T35] audit: type=1800 audit(1612431966.690:52741): pid=2723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14308 res=0 errno=0 09:46:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000106, 0x4) 09:46:06 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002701, 0x4) 09:46:07 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002700, 0x4) 09:46:07 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002700, 0x4) [ 2503.330012][ T35] audit: type=1800 audit(1612431967.480:52742): pid=2733 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:46:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000201, 0x4) [ 2503.656185][ T35] audit: type=1800 audit(1612431967.800:52743): pid=2741 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14302 res=0 errno=0 09:46:07 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002800, 0x4) 09:46:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002301, 0x4) 09:46:08 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000106, 0x4) 09:46:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000104, 0x4) 09:46:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000300, 0x4) [ 2504.364143][ T35] audit: type=1800 audit(1612431968.510:52744): pid=2755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:46:08 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002701, 0x4) [ 2504.742552][ T35] audit: type=1800 audit(1612431968.890:52745): pid=2762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:46:08 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002801, 0x4) 09:46:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002400, 0x4) 09:46:09 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000f2, 0x4) 09:46:09 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fb, 0x4) 09:46:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000301, 0x4) 09:46:09 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002800, 0x4) 09:46:09 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002900, 0x4) [ 2505.764108][ T35] audit: type=1800 audit(1612431969.910:52746): pid=2785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:46:10 executing program 1: socket(0xa, 0x5, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x109081, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b80000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd0001f884000000080000002c00a75204000000ce01ffbb5aacd924c98464ab54f00f0abebc04513b84128f3bb661810ab35196379b21e6146fd47f5efaa18b9ddacbf0f5164b649b7ced93776f65883c331a8d96611118d780c3a407f40e624f209f41ad7910dcb7915c07f2e830c1ed3b80acba6c6c3d0321a532fa253d830677bc360f80ca5910be634b61aa20ecd2"], 0x1e5) 09:46:10 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002401, 0x4) 09:46:10 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e4, 0x4) 09:46:10 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fb, 0x4) 09:46:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000500, 0x4) 09:46:11 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002801, 0x4) 09:46:11 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002901, 0x4) 09:46:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002500, 0x4) [ 2507.074058][ T35] audit: type=1800 audit(1612431971.220:52747): pid=2819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14308 res=0 errno=0 09:46:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e6, 0x4) 09:46:11 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000fb, 0x4) 09:46:11 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002900, 0x4) [ 2507.699181][ T35] audit: type=1800 audit(1612431971.851:52748): pid=2830 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:46:12 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000501, 0x4) 09:46:12 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002a00, 0x4) 09:46:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002501, 0x4) 09:46:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000af, 0x4) 09:46:12 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e3, 0x4) 09:46:13 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002901, 0x4) 09:46:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000600, 0x4) 09:46:13 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002a01, 0x4) 09:46:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002600, 0x4) 09:46:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000df, 0x4) 09:46:13 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002a00, 0x4) [ 2509.682064][ T35] audit: type=1800 audit(1612431973.831:52749): pid=2875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14292 res=0 errno=0 09:46:13 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e3, 0x4) 09:46:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000601, 0x4) [ 2510.339820][ T35] audit: type=1800 audit(1612431974.491:52750): pid=2883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:46:14 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002b00, 0x4) 09:46:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002601, 0x4) 09:46:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000dd, 0x4) 09:46:14 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002a01, 0x4) [ 2510.722423][ T35] audit: type=1800 audit(1612431974.871:52751): pid=2895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14285 res=0 errno=0 09:46:15 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000e3, 0x4) 09:46:15 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000700, 0x4) 09:46:15 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002b01, 0x4) 09:46:15 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002700, 0x4) 09:46:15 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d2, 0x4) [ 2511.727217][ T35] audit: type=1800 audit(1612431975.871:52752): pid=2914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:46:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000db, 0x4) 09:46:16 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002b00, 0x4) 09:46:16 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000701, 0x4) 09:46:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000da, 0x4) 09:46:16 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002c00, 0x4) 09:46:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002701, 0x4) 09:46:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000db, 0x4) 09:46:17 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002b01, 0x4) 09:46:17 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000801, 0x4) 09:46:17 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a1, 0x4) 09:46:18 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002c01, 0x4) 09:46:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002800, 0x4) 09:46:18 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000cd, 0x4) 09:46:18 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002c00, 0x4) 09:46:18 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000900, 0x4) 09:46:18 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002d00, 0x4) [ 2514.628899][ T35] audit: type=1800 audit(1612431978.781:52753): pid=2978 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:46:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700009b, 0x4) 09:46:19 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d0, 0x4) 09:46:19 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002c01, 0x4) 09:46:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002801, 0x4) 09:46:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000901, 0x4) 09:46:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000099, 0x4) 09:46:20 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002d01, 0x4) 09:46:20 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000d0, 0x4) 09:46:20 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002d00, 0x4) 09:46:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002900, 0x4) 09:46:20 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000a00, 0x4) [ 2516.634445][ T35] audit: type=1800 audit(1612431980.781:52754): pid=3022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:46:21 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000cc, 0x4) 09:46:21 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002e00, 0x4) 09:46:21 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c9, 0x4) 09:46:21 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002d01, 0x4) 09:46:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002901, 0x4) 09:46:22 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000a01, 0x4) 09:46:22 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002e01, 0x4) [ 2517.926664][ T35] audit: type=1800 audit(1612431982.071:52755): pid=3052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14281 res=0 errno=0 09:46:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008c, 0x4) 09:46:22 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c9, 0x4) 09:46:22 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002e00, 0x4) 09:46:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002a00, 0x4) 09:46:23 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000b00, 0x4) [ 2518.857277][ T35] audit: type=1800 audit(1612431983.002:52756): pid=3078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14287 res=0 errno=0 09:46:23 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008c, 0x4) 09:46:23 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002f00, 0x4) 09:46:23 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c9, 0x4) 09:46:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002a01, 0x4) 09:46:23 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002e01, 0x4) 09:46:24 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000b01, 0x4) 09:46:24 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002f01, 0x4) [ 2520.093206][ T35] audit: type=1800 audit(1612431984.242:52757): pid=3106 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:46:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008c, 0x4) 09:46:24 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002f00, 0x4) 09:46:24 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002b00, 0x4) 09:46:25 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002f00, 0x4) 09:46:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000c00, 0x4) 09:46:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000c2, 0x4) 09:46:25 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003000, 0x4) 09:46:25 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000be, 0x4) 09:46:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002b01, 0x4) 09:46:26 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002f01, 0x4) 09:46:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000c01, 0x4) [ 2522.243254][ T35] audit: type=1800 audit(1612431986.392:52758): pid=3151 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14295 res=0 errno=0 09:46:26 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003001, 0x4) 09:46:26 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000be, 0x4) 09:46:26 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000077, 0x4) 09:46:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002c00, 0x4) 09:46:27 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003000, 0x4) 09:46:27 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a5, 0x4) 09:46:27 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003100, 0x4) 09:46:27 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000ac, 0x4) 09:46:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000d00, 0x4) 09:46:28 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003001, 0x4) [ 2524.081734][ T35] audit: type=1800 audit(1612431988.232:52759): pid=3189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:46:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002c01, 0x4) 09:46:28 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a5, 0x4) 09:46:28 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003101, 0x4) 09:46:28 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a4, 0x4) 09:46:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000d01, 0x4) 09:46:29 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003100, 0x4) [ 2525.182689][ T35] audit: type=1800 audit(1612431989.332:52760): pid=3213 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:46:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002d00, 0x4) 09:46:29 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a5, 0x4) 09:46:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe70000a0, 0x4) 09:46:29 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003200, 0x4) 09:46:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000e00, 0x4) 09:46:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002d01, 0x4) [ 2526.378659][ T35] audit: type=1800 audit(1612431990.532:52761): pid=3241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:46:30 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003101, 0x4) 09:46:30 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700009e, 0x4) 09:46:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700005d, 0x4) 09:46:31 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003201, 0x4) 09:46:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000e01, 0x4) [ 2527.405979][ T35] audit: type=1800 audit(1612431991.562:52762): pid=3265 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:46:31 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003200, 0x4) 09:46:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002e00, 0x4) [ 2527.467081][ T35] audit: type=1800 audit(1612431991.582:52763): pid=3262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14285 res=0 errno=0 09:46:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000091, 0x4) 09:46:32 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003300, 0x4) 09:46:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700005d, 0x4) 09:46:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000f00, 0x4) 09:46:32 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003201, 0x4) [ 2528.498315][ T35] audit: type=1800 audit(1612431992.652:52764): pid=3286 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:46:32 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000093, 0x4) 09:46:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002e01, 0x4) 09:46:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700005d, 0x4) 09:46:33 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003301, 0x4) 09:46:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000f01, 0x4) 09:46:33 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003300, 0x4) [ 2529.530545][ T35] audit: type=1800 audit(1612431993.682:52765): pid=3312 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:46:33 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000093, 0x4) 09:46:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002f00, 0x4) 09:46:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000056, 0x4) 09:46:34 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003400, 0x4) 09:46:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001001, 0x4) [ 2530.320775][ T35] audit: type=1800 audit(1612431994.473:52766): pid=3333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14308 res=0 errno=0 09:46:34 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003301, 0x4) 09:46:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7002f01, 0x4) 09:46:35 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000093, 0x4) 09:46:35 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003401, 0x4) [ 2531.140025][ T35] audit: type=1800 audit(1612431995.293:52767): pid=3349 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14287 res=0 errno=0 09:46:35 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008f, 0x4) 09:46:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001100, 0x4) 09:46:36 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003400, 0x4) 09:46:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003000, 0x4) 09:46:36 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008c, 0x4) 09:46:36 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003500, 0x4) 09:46:36 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008b, 0x4) 09:46:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001101, 0x4) 09:46:37 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003401, 0x4) 09:46:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003001, 0x4) 09:46:37 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008c, 0x4) 09:46:37 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003501, 0x4) [ 2533.353764][ T35] audit: type=1800 audit(1612431997.493:52768): pid=3396 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14292 res=0 errno=0 09:46:37 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008b, 0x4) 09:46:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001200, 0x4) 09:46:38 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003500, 0x4) 09:46:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003100, 0x4) 09:46:38 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003600, 0x4) [ 2534.277690][ T35] audit: type=1800 audit(1612431998.423:52769): pid=3418 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14292 res=0 errno=0 09:46:38 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008c, 0x4) 09:46:38 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700008b, 0x4) 09:46:39 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001201, 0x4) 09:46:39 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003501, 0x4) 09:46:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003101, 0x4) [ 2535.275136][ T35] audit: type=1800 audit(1612431999.413:52770): pid=3437 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:46:39 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000087, 0x4) 09:46:39 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003601, 0x4) 09:46:40 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700007e, 0x4) 09:46:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001300, 0x4) 09:46:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003200, 0x4) [ 2536.241207][ T35] audit: type=1800 audit(1612432000.383:52771): pid=3459 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14287 res=0 errno=0 09:46:40 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700007a, 0x4) 09:46:40 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003600, 0x4) 09:46:40 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003700, 0x4) 09:46:41 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700007e, 0x4) 09:46:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001301, 0x4) 09:46:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003201, 0x4) 09:46:41 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000079, 0x4) 09:46:41 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003601, 0x4) 09:46:41 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003701, 0x4) [ 2537.630145][ T35] audit: type=1800 audit(1612432001.773:52772): pid=3488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14303 res=0 errno=0 09:46:42 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700007e, 0x4) 09:46:42 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001400, 0x4) 09:46:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003300, 0x4) [ 2538.494833][ T35] audit: type=1800 audit(1612432002.633:52773): pid=3501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14285 res=0 errno=0 09:46:42 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000082, 0x4) 09:46:42 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003700, 0x4) 09:46:43 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003800, 0x4) 09:46:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700007c, 0x4) 09:46:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003301, 0x4) 09:46:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001401, 0x4) [ 2539.492466][ T35] audit: type=1800 audit(1612432003.633:52774): pid=3523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:46:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700003b, 0x4) 09:46:43 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003701, 0x4) 09:46:44 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003801, 0x4) 09:46:44 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700003b, 0x4) 09:46:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001500, 0x4) [ 2540.330437][ T35] audit: type=1800 audit(1612432004.473:52775): pid=3546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14291 res=0 errno=0 09:46:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003400, 0x4) 09:46:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000073, 0x4) 09:46:45 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003800, 0x4) 09:46:45 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003900, 0x4) 09:46:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000071, 0x4) 09:46:45 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001501, 0x4) 09:46:45 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003401, 0x4) 09:46:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001500, 0x4) 09:46:46 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003801, 0x4) [ 2541.899094][ T35] audit: type=1800 audit(1612432006.044:52776): pid=3577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14308 res=0 errno=0 09:46:46 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003901, 0x4) 09:46:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700006f, 0x4) 09:46:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001600, 0x4) 09:46:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003500, 0x4) [ 2542.722463][ T35] audit: type=1800 audit(1612432006.864:52777): pid=3594 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:46:47 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000061, 0x4) 09:46:47 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003900, 0x4) 09:46:47 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001601, 0x4) [ 2543.360973][ T35] audit: type=1800 audit(1612432007.504:52778): pid=3612 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:46:47 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003a00, 0x4) 09:46:47 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000056, 0x4) 09:46:48 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003501, 0x4) 09:46:48 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000061, 0x4) 09:46:48 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003901, 0x4) 09:46:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001700, 0x4) [ 2544.318248][ T35] audit: type=1800 audit(1612432008.464:52779): pid=3629 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14303 res=0 errno=0 09:46:48 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003a01, 0x4) 09:46:48 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000056, 0x4) 09:46:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003600, 0x4) 09:46:49 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003a00, 0x4) [ 2545.227938][ T35] audit: type=1800 audit(1612432009.374:52780): pid=3645 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:46:49 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003b00, 0x4) [ 2545.306327][ T35] audit: type=1800 audit(1612432009.424:52781): pid=3653 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14303 res=0 errno=0 09:46:49 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000061, 0x4) 09:46:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001701, 0x4) 09:46:50 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000056, 0x4) 09:46:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003601, 0x4) [ 2546.000943][ T35] audit: type=1800 audit(1612432010.144:52782): pid=3664 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14286 res=0 errno=0 09:46:50 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003b01, 0x4) [ 2546.391339][ T35] audit: type=1800 audit(1612432010.534:52783): pid=3671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14300 res=0 errno=0 09:46:50 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003a01, 0x4) 09:46:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001800, 0x4) [ 2546.594149][ T35] audit: type=1800 audit(1612432010.734:52784): pid=3679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14308 res=0 errno=0 09:46:50 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003a01, 0x4) 09:46:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000021, 0x4) 09:46:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003700, 0x4) 09:46:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001801, 0x4) 09:46:51 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003c00, 0x4) 09:46:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000057, 0x4) 09:46:51 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003b00, 0x4) 09:46:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700001b, 0x4) 09:46:52 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003701, 0x4) 09:46:52 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000052, 0x4) 09:46:53 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001900, 0x4) 09:46:53 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003c01, 0x4) 09:46:53 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003b01, 0x4) 09:46:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000053, 0x4) 09:46:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003800, 0x4) 09:46:54 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700004b, 0x4) [ 2549.802479][ T35] audit: type=1800 audit(1612432013.944:52785): pid=3736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14297 res=0 errno=0 09:46:54 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003d00, 0x4) 09:46:54 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003c00, 0x4) [ 2549.885679][ T35] audit: type=1800 audit(1612432013.984:52786): pid=3738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:46:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001901, 0x4) 09:46:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700004e, 0x4) 09:46:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003801, 0x4) 09:46:55 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000048, 0x4) 09:46:55 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003d01, 0x4) [ 2550.927279][ T35] audit: type=1800 audit(1612432015.074:52787): pid=3763 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:46:55 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003c01, 0x4) [ 2551.003717][ T35] audit: type=1800 audit(1612432015.074:52788): pid=3765 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14302 res=0 errno=0 09:46:55 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a00, 0x4) 09:46:55 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700004c, 0x4) 09:46:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003900, 0x4) 09:46:56 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000048, 0x4) [ 2552.034329][ T35] audit: type=1800 audit(1612432016.184:52789): pid=3785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14296 res=0 errno=0 09:46:56 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003d00, 0x4) 09:46:56 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700004c, 0x4) 09:46:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001a01, 0x4) 09:46:56 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003e00, 0x4) 09:46:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003901, 0x4) 09:46:57 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003c01, 0x4) 09:46:57 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000046, 0x4) 09:46:57 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003d01, 0x4) 09:46:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001b00, 0x4) 09:46:57 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003e01, 0x4) 09:46:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003a00, 0x4) 09:46:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000033, 0x4) 09:46:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000031, 0x4) 09:46:58 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003e00, 0x4) 09:46:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001b01, 0x4) [ 2554.456588][ T35] audit: type=1800 audit(1612432018.605:52790): pid=3840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14308 res=0 errno=0 09:46:58 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003f00, 0x4) 09:46:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003a01, 0x4) 09:46:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700002e, 0x4) 09:46:59 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003e01, 0x4) 09:46:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700002d, 0x4) [ 2555.594619][ T35] audit: type=1800 audit(1612432019.745:52791): pid=3863 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14298 res=0 errno=0 09:46:59 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003f01, 0x4) 09:46:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001c00, 0x4) 09:47:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700002e, 0x4) 09:47:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003b00, 0x4) 09:47:00 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003f00, 0x4) [ 2556.402181][ T35] audit: type=1800 audit(1612432020.545:52792): pid=3877 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file1" dev="sda1" ino=14299 res=0 errno=0 09:47:00 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x18b502, 0x0) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000000)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)=0x800) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x20) 09:47:00 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7004000, 0x4) [ 2556.718468][ T35] audit: type=1800 audit(1612432020.865:52793): pid=3886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14307 res=0 errno=0 09:47:00 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001c01, 0x4) 09:47:01 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)=0x800) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x20) 09:47:01 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x18b502, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)=0x800) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x20) 09:47:01 executing program 1: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp1\x00', 0x18b502, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x20) 09:47:01 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000021, 0x4) 09:47:01 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000029, 0x4) 09:47:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003b01, 0x4) 09:47:01 executing program 5: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003f01, 0x4) 09:47:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7001d00, 0x4) 09:47:01 executing program 0: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7004001, 0x4) [ 2557.750964][ T35] audit: type=1800 audit(1612432021.895:52794): pid=3915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file1" dev="sda1" ino=14299 res=0 errno=0 [ 2557.839566][ T35] audit: type=1800 audit(1612432021.925:52795): pid=3909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="file1" dev="sda1" ino=14301 res=0 errno=0 09:47:02 executing program 4: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7000027, 0x4) 09:47:02 executing program 1: r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe700001d, 0x4) 09:47:02 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) fadvise64(r0, 0x0, 0xe7003c00, 0x4) [ 2558.364008][ T35] audit: type=1800 audit(1612432022.515:52796): pid=3929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file1" dev="sda1" ino=14292 res=0 errno=0 [ 2558.464140][T28493] ================================================================== [ 2558.472252][T28493] BUG: KCSAN: data-race in __wb_update_bandwidth / percpu_counter_add_batch [ 2558.480930][T28493] [ 2558.483357][T28493] write to 0xffff888102f0d518 of 8 bytes by task 3938 on cpu 1: [ 2558.490974][T28493] percpu_counter_add_batch+0xa4/0x110 [ 2558.496439][T28493] account_page_dirtied+0x196/0x300 [ 2558.501637][T28493] __set_page_dirty+0xbb/0x1d0 [ 2558.506405][T28493] mark_buffer_dirty+0x126/0x230 [ 2558.511332][T28493] block_write_end+0x13d/0x230 [ 2558.516112][T28493] generic_write_end+0x5c/0x240 [ 2558.520953][T28493] ext4_da_write_end+0x59b/0x760 [ 2558.525888][T28493] generic_perform_write+0x23e/0x3a0 [ 2558.531178][T28493] ext4_buffered_write_iter+0x2e5/0x3e0 [ 2558.536726][T28493] ext4_file_write_iter+0x47a/0x1060 [ 2558.542004][T28493] vfs_write+0x6f0/0x7e0 [ 2558.546238][T28493] ksys_write+0xce/0x180 [ 2558.550474][T28493] __x64_sys_write+0x3e/0x50 [ 2558.555055][T28493] do_syscall_64+0x39/0x80 [ 2558.559461][T28493] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2558.565615][T28493] [ 2558.567930][T28493] read to 0xffff888102f0d518 of 8 bytes by task 28493 on cpu 0: [ 2558.575546][T28493] __wb_update_bandwidth+0x8d/0x5d0 [ 2558.580749][T28493] wb_update_bandwidth+0x59/0x80 [ 2558.585680][T28493] wb_writeback+0x2a3/0x660 [ 2558.590187][T28493] wb_do_writeback+0x520/0x5d0 [ 2558.594954][T28493] wb_workfn+0xc8/0x430 [ 2558.599105][T28493] process_one_work+0x3e1/0x950 [ 2558.603985][T28493] worker_thread+0x616/0xa70 [ 2558.608568][T28493] kthread+0x20b/0x230 [ 2558.612640][T28493] ret_from_fork+0x1f/0x30 [ 2558.617060][T28493] [ 2558.619374][T28493] Reported by Kernel Concurrency Sanitizer on: [ 2558.625504][T28493] CPU: 0 PID: 28493 Comm: kworker/u4:3 Not tainted 5.11.0-rc6-syzkaller #0 [ 2558.634165][T28493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2558.644307][T28493] Workqueue: writeback wb_workfn (flush-8:0) [ 2558.650299][T28493] ================================================================== [ 2558.658350][T28493] Kernel panic - not syncing: panic_on_warn set ... [ 2558.664922][T28493] CPU: 0 PID: 28493 Comm: kworker/u4:3 Not tainted 5.11.0-rc6-syzkaller #0 [ 2558.673502][T28493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2558.683620][T28493] Workqueue: writeback wb_workfn (flush-8:0) [ 2558.689612][T28493] Call Trace: [ 2558.692890][T28493] dump_stack+0x116/0x15d [ 2558.697219][T28493] panic+0x1e7/0x5fa [ 2558.701112][T28493] ? vprintk_emit+0x2e2/0x360 [ 2558.705806][T28493] kcsan_report+0x67b/0x680 [ 2558.710332][T28493] ? kcsan_setup_watchpoint+0x472/0x4d0 [ 2558.715868][T28493] ? __wb_update_bandwidth+0x8d/0x5d0 [ 2558.721326][T28493] ? wb_update_bandwidth+0x59/0x80 [ 2558.726439][T28493] ? wb_writeback+0x2a3/0x660 [ 2558.731110][T28493] ? wb_do_writeback+0x520/0x5d0 [ 2558.736038][T28493] ? wb_workfn+0xc8/0x430 [ 2558.740367][T28493] ? process_one_work+0x3e1/0x950 [ 2558.745388][T28493] ? worker_thread+0x616/0xa70 [ 2558.750145][T28493] ? kthread+0x20b/0x230 [ 2558.754386][T28493] ? ret_from_fork+0x1f/0x30 [ 2558.758980][T28493] ? __writeback_single_inode+0x2b2/0x500 [ 2558.764701][T28493] ? _raw_spin_unlock+0x22/0x40 [ 2558.769548][T28493] kcsan_setup_watchpoint+0x472/0x4d0 [ 2558.774927][T28493] __wb_update_bandwidth+0x8d/0x5d0 [ 2558.780134][T28493] ? move_expired_inodes+0x472/0x4a0 [ 2558.785444][T28493] wb_update_bandwidth+0x59/0x80 [ 2558.790480][T28493] wb_writeback+0x2a3/0x660 [ 2558.795026][T28493] ? cpumask_next+0x1e/0x30 [ 2558.799531][T28493] wb_do_writeback+0x520/0x5d0 [ 2558.804318][T28493] wb_workfn+0xc8/0x430 [ 2558.808468][T28493] ? check_preempt_wakeup+0x1cb/0x370 [ 2558.813833][T28493] ? try_to_wake_up+0x254/0x440 [ 2558.818677][T28493] ? strscpy+0x12f/0x160 [ 2558.822919][T28493] process_one_work+0x3e1/0x950 [ 2558.828500][T28493] worker_thread+0x616/0xa70 [ 2558.834766][T28493] ? finish_task_switch+0xc0/0x2a0 [ 2558.841637][T28493] ? process_one_work+0x950/0x950 [ 2558.846702][T28493] kthread+0x20b/0x230 [ 2558.850797][T28493] ? process_one_work+0x950/0x950 [ 2558.856477][T28493] ? kthread_blkcg+0x80/0x80 [ 2558.861282][T28493] ret_from_fork+0x1f/0x30 [ 2558.866554][T28493] Kernel Offset: disabled [ 2558.870998][T28493] Rebooting in 86400 seconds..