restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.235547] random: sshd: uninitialized urandom read (32 bytes read) [ 33.459040] kauditd_printk_skb: 9 callbacks suppressed [ 33.459047] audit: type=1400 audit(1570677547.893:35): avc: denied { map } for pid=6825 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 33.503996] random: sshd: uninitialized urandom read (32 bytes read) [ 34.105373] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.1.36' (ECDSA) to the list of known hosts. [ 39.715750] random: sshd: uninitialized urandom read (32 bytes read) 2019/10/10 03:19:14 fuzzer started [ 39.908172] audit: type=1400 audit(1570677554.343:36): avc: denied { map } for pid=6835 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 40.652129] random: cc1: uninitialized urandom read (8 bytes read) 2019/10/10 03:19:15 dialing manager at 10.128.0.105:43081 2019/10/10 03:19:16 syscalls: 2500 2019/10/10 03:19:16 code coverage: enabled 2019/10/10 03:19:16 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/10/10 03:19:16 extra coverage: extra coverage is not supported by the kernel 2019/10/10 03:19:16 setuid sandbox: enabled 2019/10/10 03:19:16 namespace sandbox: enabled 2019/10/10 03:19:16 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/10 03:19:16 fault injection: enabled 2019/10/10 03:19:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/10 03:19:16 net packet injection: enabled 2019/10/10 03:19:16 net device setup: enabled 2019/10/10 03:19:16 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist [ 42.760555] random: crng init done 03:20:12 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x2}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:20:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000300)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x210) 03:20:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x82630, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 03:20:12 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write(r1, &(0x7f00000001c0), 0xfffffef3) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000080)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x2}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:20:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 03:20:12 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') write(r1, &(0x7f00000001c0), 0xfffffef3) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) [ 97.606327] audit: type=1400 audit(1570677612.043:37): avc: denied { map } for pid=6835 comm="syz-fuzzer" path="/root/syzkaller-shm389777506" dev="sda1" ino=16490 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 97.660143] audit: type=1400 audit(1570677612.073:38): avc: denied { map } for pid=6851 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=76 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 97.802729] IPVS: ftp: loaded support on port[0] = 21 [ 98.579768] IPVS: ftp: loaded support on port[0] = 21 [ 98.628758] chnl_net:caif_netlink_parms(): no params data found [ 98.674946] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.681978] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.689153] device bridge_slave_0 entered promiscuous mode [ 98.697662] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.704471] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.712082] device bridge_slave_1 entered promiscuous mode [ 98.712423] IPVS: ftp: loaded support on port[0] = 21 [ 98.744543] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 98.755317] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 98.787378] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 98.794916] team0: Port device team_slave_0 added [ 98.813335] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 98.820634] team0: Port device team_slave_1 added [ 98.828183] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 98.837721] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 98.851322] chnl_net:caif_netlink_parms(): no params data found [ 98.921986] device hsr_slave_0 entered promiscuous mode [ 98.960331] device hsr_slave_1 entered promiscuous mode [ 99.038410] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 99.045519] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 99.053996] IPVS: ftp: loaded support on port[0] = 21 [ 99.092854] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.099292] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.106374] device bridge_slave_0 entered promiscuous mode [ 99.116561] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.123396] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.130398] device bridge_slave_1 entered promiscuous mode [ 99.158592] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 99.184479] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.190937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.197710] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.204091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.212718] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 99.241289] chnl_net:caif_netlink_parms(): no params data found [ 99.260006] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 99.267196] team0: Port device team_slave_0 added [ 99.272802] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 99.279828] team0: Port device team_slave_1 added [ 99.289200] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 99.313834] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 99.324989] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.332759] IPVS: ftp: loaded support on port[0] = 21 [ 99.340976] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.347859] device bridge_slave_0 entered promiscuous mode [ 99.354482] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.361001] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.367842] device bridge_slave_1 entered promiscuous mode [ 99.400243] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 99.452032] device hsr_slave_0 entered promiscuous mode [ 99.490329] device hsr_slave_1 entered promiscuous mode [ 99.545260] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 99.554055] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 99.563583] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 99.586364] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 99.593655] team0: Port device team_slave_0 added [ 99.625996] chnl_net:caif_netlink_parms(): no params data found [ 99.635912] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 99.643235] team0: Port device team_slave_1 added [ 99.653004] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 99.671288] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 99.703663] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.722276] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.730556] IPVS: ftp: loaded support on port[0] = 21 [ 99.793294] device hsr_slave_0 entered promiscuous mode [ 99.840393] device hsr_slave_1 entered promiscuous mode [ 99.894643] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 99.906154] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 99.957988] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 99.972698] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.979086] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.986372] device bridge_slave_0 entered promiscuous mode [ 99.995095] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.001818] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.008752] device bridge_slave_1 entered promiscuous mode [ 100.016963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.049405] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 100.058706] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 100.072852] chnl_net:caif_netlink_parms(): no params data found [ 100.084859] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 100.092273] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 100.128908] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 100.136089] team0: Port device team_slave_0 added [ 100.141852] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 100.148864] team0: Port device team_slave_1 added [ 100.159690] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 100.168210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 100.182063] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 100.206219] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.212797] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.219684] device bridge_slave_0 entered promiscuous mode [ 100.226520] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.233379] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.240515] device bridge_slave_1 entered promiscuous mode [ 100.252092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.259680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.297813] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 100.335033] device hsr_slave_0 entered promiscuous mode [ 100.390456] device hsr_slave_1 entered promiscuous mode [ 100.431309] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 100.437407] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.445997] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 100.454431] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 100.465358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.473350] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 100.480899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.488608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.496308] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.502695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.512029] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 100.523421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.537351] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 100.544730] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 100.552463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.561457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.568979] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.575364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.583276] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 100.599471] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 100.607204] team0: Port device team_slave_0 added [ 100.614173] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 100.622931] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 100.631290] team0: Port device team_slave_1 added [ 100.636554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.649386] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 100.700768] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 100.707830] chnl_net:caif_netlink_parms(): no params data found [ 100.717650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 100.725030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.732727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.739569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.749978] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 100.760305] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 100.766405] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.774223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 100.782474] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 100.803345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.810639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.819290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 100.836086] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 100.844872] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 100.851695] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.857708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.865760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.873838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.881664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.889159] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.895534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.902460] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.909343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.935705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 100.945112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 100.992518] device hsr_slave_0 entered promiscuous mode [ 101.040456] device hsr_slave_1 entered promiscuous mode [ 101.105330] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 101.112650] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 101.124239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.132838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.140634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.148322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.156127] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.162515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.171278] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 101.179237] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 101.187961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 101.199431] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.206322] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.213815] device bridge_slave_0 entered promiscuous mode [ 101.219959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.228749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.236292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 101.244179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 101.252148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.260839] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.267193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.274249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.282757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 101.296625] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 101.304899] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 101.314500] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.321129] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.328146] device bridge_slave_1 entered promiscuous mode [ 101.334558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.342395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.349686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 101.357478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.365159] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.371547] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.380514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 101.388693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 101.426577] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 101.436873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 101.447897] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 101.454106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.462388] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 101.472298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 101.481173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 101.488762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.496795] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.504545] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.524806] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 101.533535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 101.545107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.564233] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.571345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 101.581085] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 101.590889] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 101.602179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.608931] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 101.617454] team0: Port device team_slave_0 added [ 101.623914] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 101.634637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 101.642447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.649926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.658077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.665686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 101.673314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.682277] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 101.690171] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 101.698366] team0: Port device team_slave_1 added [ 101.704423] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 101.712114] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 101.721425] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 101.734748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 101.743060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 101.753900] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.761274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.768652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.776320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 101.783989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.791820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 101.799230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.807710] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 101.825039] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 101.831859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.841090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.849739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.859102] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 101.912705] device hsr_slave_0 entered promiscuous mode [ 101.940743] device hsr_slave_1 entered promiscuous mode [ 101.980977] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 101.988354] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 102.001539] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.013574] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 102.021576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.029033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.036785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.043821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.052524] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 102.058594] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.066443] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 102.073997] 8021q: adding VLAN 0 to HW filter on device team0 03:20:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}], [], 0x700}) [ 102.084100] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 102.091271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 102.099759] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 102.113086] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 102.149979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 102.162849] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 102.183003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.192792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.204989] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.206066] EXT4-fs (sda1): quotafile must be on filesystem root [ 102.211441] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.213544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.232795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.240783] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.247162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.254367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 102.261427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 102.274923] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.283191] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 102.292521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 102.303266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.310430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 102.317711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.327774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.339154] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.346126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.350666] EXT4-fs (sda1): quotafile must be on filesystem root [ 102.361932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.369719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.377852] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.384256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.395013] 8021q: adding VLAN 0 to HW filter on device batadv0 03:20:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'em1'}, {0x20, 'ecb(twofish)\x00'}], 0xa, "378303123ea552fa279895406686a4610636f9e3896ed87c00ee244933845cdf40bdb163b88792a35d657f4222e47e7246b579fbd39498f0d8fd09b262b95c204bc0d8cd507c2fde06506d7d490b8f9f1bc7803204aea64c907fc516871a92037e84c402f74fe8620a7b976359b26b02d65c8c8f3a35fdaa9ec4962e41e36dbf7fd10db190c49f98ddb090a04668e099b79ca5"}, 0xb0) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x400c}], 0x1}, 0x0) [ 102.412140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 102.425268] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 102.437502] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 102.447621] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.455281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.464054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.471883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.484732] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 102.498243] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 102.506502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 102.527340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.539175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.547856] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 102.557168] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.566791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 03:20:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [], 0xa, "378303123ea552fa279895406686a4610636f9e3896ed87c00ee244933845cdf40bdb163b88792a35d657f4222e47e7246b579fbd3"}, 0x40) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x400c}], 0x1}, 0x0) [ 102.574596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.582970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.590507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.598760] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.609372] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 03:20:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) write(r0, &(0x7f0000000040)="e0", 0xfffffe00) [ 102.622724] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 102.628878] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.651551] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 102.665591] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 102.675807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 102.688407] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 102.696212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.705545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.713596] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.719953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.727142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.734649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.744381] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 102.756621] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 102.763802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 102.771189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 102.778752] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 102.788641] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 102.798739] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 102.812977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 102.820250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.833593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.844806] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.851279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.858437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 102.866185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.873852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 102.881654] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.891395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 102.899990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 102.912452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 102.923602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 102.946184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 102.974445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 102.982448] hrtimer: interrupt took 37159 ns [ 102.992311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 103.012351] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 103.051571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 103.076449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.091157] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 03:20:17 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(0xffffffffffffffff, 0x0, 0x178, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000009c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_SET_SECUREBITS(0x1c, 0x17) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xc0000) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000000)=""/216) epoll_wait(r1, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x7) keyctl$reject(0x13, 0x0, 0x0, 0x7fff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x11502}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x98}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x0, 0x0, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f0000000040), &(0x7f0000002180)=""/4096}, 0x18) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) getuid() geteuid() socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)) r7 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4844e302002653411d289e0000000000000000400000000000deffffd76f00", "0ec832aa37c974991ec85895d52dc4092a5c310900ff0100"}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000980)=0xe8) r9 = socket$inet(0x10, 0x2, 0x0) sendmsg(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000d00)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r11, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setregid(0x0, 0xee00) fsetxattr$system_posix_acl(r7, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000780)={{}, {0x1, 0xc}, [{0x2, 0x0, r8}, {0x2, 0x9, 0xee00}, {0x2, 0x1, r10}, {}, {}, {0x2, 0x6}], {0x4, 0x3}, [{0x8, 0x2}, {0x8, 0x5}, {0x8, 0x2}, {0x8, 0x1}, {0x8, 0x2}], {0x10, 0x4}, {0x20, 0x4}}, 0x7c, 0x1) io_setup(0x8000, &(0x7f0000000080)) [ 103.110457] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 103.139700] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 103.149569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:20:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 103.156348] audit: type=1400 audit(1570677617.583:39): avc: denied { create } for pid=6939 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 103.183302] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 103.189394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 103.199635] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 103.214450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 103.224543] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 103.249178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 103.259485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.284605] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 103.294772] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 03:20:17 executing program 0: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000801, 0x0) write(r0, &(0x7f0000000100)="d2", 0x1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1145042, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 03:20:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 103.312190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 103.319850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.329743] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 103.336559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 103.355607] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 103.369859] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 103.386022] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 103.386321] audit: type=1800 audit(1570677617.823:40): pid=6952 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=16532 res=0 03:20:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 103.403448] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 103.427496] 8021q: adding VLAN 0 to HW filter on device batadv0 03:20:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c7407c91a97bbeaca78b1c9cdadd9b1ea51e61a5cc89fde44f5c0a7f8ed810e5d9aa5c4756f5f22d40489fe103c2f61db754d443ebf6657c96513315aabe2da24ba18f81988865251f1485c3d7823561a6de12c885610909e07b4e18149b8a670b8a2148ba2b1caa30518659200198e017c3d55cf14ec315cf"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000040)="b9ff03f0000d698cb89e40f008061fffffff00004000630677fbac141414e9", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="92"}, 0x40) 03:20:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [], 0xa, "378303123ea552fa279895406686a4610636f9e3896ed87c00ee244933845cdf40bdb163b88792a35d657f4222e47e7246b579fbd39498f0d8fd09b262b95c204bc0d8cd507c2fde06506d7d490b8f9f1bc7803204aea64c907fc516871a92037e84c402f74fe8620a7b976359b26b02d65c8c8f3a"}, 0x80) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x400c}], 0x1}, 0x0) 03:20:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") msgrcv(0x0, 0x0, 0x0, 0x0, 0x5800) 03:20:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) close(r0) 03:20:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x3e9, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:20:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) close(r0) 03:20:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 105.476443] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, 03:20:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) [ 105.533800] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, 03:20:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) 03:20:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/88, 0x58) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r1, 0x0, r1) r4 = dup2(r3, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000500)='yeah\x008-\xe6\xb8]\x8e]\xb9zR3I\xe5j\x18\x04\x9a\'\x01\xf0\xfff\a\xd0DS\x12,\x87\xb5\xbb$\x88-\xfaf\x1c\xaf\xb8\xb4\xdb\x98[\xd5\x00\x00\x00\x00\x00', 0x234) r5 = dup(r0) ioctl$LOOP_GET_STATUS(r5, 0x4c03, 0x0) 03:20:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) [ 105.729432] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, 03:20:20 executing program 0: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff59d) execve(0x0, 0x0, 0x0) creat(0x0, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) 03:20:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) 03:20:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 106.022829] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, 03:20:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) [ 106.199949] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, 03:20:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xb, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0xffffffc5}}, &(0x7f0000000000)='s\x96zka\x00\x00\x00\x00\x00\xf3\x13+\xa9i\xe2\x14\'\xf5\x14\xeeL\xd7\xad\xfc\xc4\xac\xd7\xdb\xcb+h\x02f\x19d\xd8\x90dN\xfa\xb2\xa3z', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 03:20:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)) 03:20:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:21 executing program 2: lseek(0xffffffffffffffff, 0x0, 0x3) 03:20:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 106.696802] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 03:20:21 executing program 2: lseek(0xffffffffffffffff, 0x0, 0x3) 03:20:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = epoll_create1(0x0) dup3(r3, r0, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(r4, r5, 0x0, 0x80000001) 03:20:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000000780)=""/244, 0xf4}, {&(0x7f0000000880)=""/43, 0x2b}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getpgid(0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x165) dup(0xffffffffffffffff) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f0000000240), 0x48ee9ce0baf87a93) r5 = open(0x0, 0x110000141042, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000100)=""/63) ftruncate(r5, 0x10099b7) unlink(&(0x7f0000000040)='./file0\x00') 03:20:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:21 executing program 2: lseek(0xffffffffffffffff, 0x0, 0x3) 03:20:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) [ 106.897341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=7149 comm=syz-executor.4 03:20:21 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) lseek(r0, 0x0, 0x3) 03:20:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 107.010719] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=7175 comm=syz-executor.4 03:20:21 executing program 3: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:21 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) lseek(r0, 0x0, 0x3) 03:20:21 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 107.311149] audit: type=1804 audit(1570677621.753:41): pid=7195 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/6/bus" dev="sda1" ino=16576 res=1 [ 107.373669] audit: type=1804 audit(1570677621.813:42): pid=7195 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/6/bus" dev="sda1" ino=16576 res=1 03:20:22 executing program 0: link(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) socket$rds(0x15, 0x5, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10004402}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x9dfefa76e4d93dc9}, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f0000000600)={@dev, @local}, &(0x7f0000000640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000780)) getsockname$packet(r0, 0x0, &(0x7f0000000800)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="b40800002c000107f1ff58980000000000000000", @ANYRES32=r6, @ANYBLOB="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"], 0x8b4}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) accept(r7, &(0x7f00000009c0)=@xdp, &(0x7f0000000a40)=0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(r8, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r9 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) 03:20:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:22 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) lseek(r0, 0x0, 0x3) 03:20:22 executing program 3: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:22 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xa5cc554) 03:20:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:22 executing program 2: syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 03:20:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:22 executing program 3: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) [ 107.893797] audit: type=1804 audit(1570677622.333:43): pid=7221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/7/bus" dev="sda1" ino=16593 res=1 03:20:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:22 executing program 2: syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) [ 108.015697] audit: type=1804 audit(1570677622.403:44): pid=7221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/7/bus" dev="sda1" ino=16593 res=1 [ 108.080355] protocol 88fb is buggy, dev hsr_slave_0 03:20:22 executing program 0: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x1bd, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmsg(r3, &(0x7f0000000480)={&(0x7f0000000180)=@can={0x1d, r4}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)="5c45e51daff82e854a03957479d5", 0xe}], 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="10000000000000000000000000000000083ccb0542ef6d9b6fbabfd95763620e177c82180328b29777226cd9a19698291c0adf95bfb76f2a1ffdebf82026365235be68e07fef9d556c14f5e2263ebc08aca8c8a34ebbfa23e4a9f374b080543099999ce520d09063f816078bf2776cbd44342cc9e1b1ecce39683a5b6df44aba75d6aa8eeb3353a91acf98a138f61b11777dfe4b0b100b4e6804b259b7ff55695ca011d2d1e743cd1edd45c825036bd2da0944a088b4e8dd9dde940a97e17e5995cd0000a31ea389871a94ad15adf9fa7a1ed65446cce3e77cf39a0bc014b638ff09a0cf5c5a19ba1639b8802639e2840471d71f1c7cf25b69cf760c95aefdd1dc29965b27d43d7cace78c1258784f05cf472d38bd77e43a8543f027b51d02e3a4c9b18b3fb60847c958ad1ca5aed2ff87e5740a24a9e2066d6b03a7688078"], 0x13f}, 0x0) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000100)={r4, 0x6, 0x3, 0x0, 0x0, 0x1, 0xc8}) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000740)={0x7f, {{0xa, 0x4e21, 0xbbf, @remote, 0xfffffff9}}}, 0x88) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000200)={0x8000000, 0xfffffff8, 0x28}) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x84003ff) r6 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000000)) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) gettid() ptrace$setopts(0x4200, 0x0, 0x8, 0x1) r8 = dup(r7) ioctl$PPPIOCGFLAGS1(r8, 0x8004745a, &(0x7f0000000040)) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r8, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x60242808}, 0xc, &(0x7f0000000680)={&(0x7f00000003c0)={0x25c, r9, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x23}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xec4000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x45b5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x727f}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xf5c9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @rand_addr=0xe9}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff77d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) sendmsg$TIPC_NL_BEARER_DISABLE(r6, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21c3a6ce90eaca47}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="c002fff8", @ANYRES16=r9, @ANYBLOB="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"], 0x3c0}, 0x1, 0x0, 0x0, 0x80}, 0x48810) 03:20:22 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = gettid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r2 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r3 = dup(r2) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r3, &(0x7f0000000000)='\x00', &(0x7f0000000140), 0x0, 0x1000) tkill(r1, 0x18) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 03:20:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:22 executing program 2: syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 03:20:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 03:20:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:22 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) [ 108.305120] audit: type=1804 audit(1570677622.743:45): pid=7267 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir160846937/syzkaller.o246qq/8/file0" dev="sda1" ino=16578 res=1 03:20:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 03:20:22 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) [ 108.477806] audit: type=1400 audit(1570677622.813:46): avc: denied { write } for pid=7255 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 108.501770] protocol 88fb is buggy, dev hsr_slave_0 [ 108.501848] protocol 88fb is buggy, dev hsr_slave_1 [ 108.600142] audit: type=1400 audit(1570677622.823:47): avc: denied { read } for pid=7255 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 108.720864] protocol 88fb is buggy, dev hsr_slave_0 [ 108.726376] protocol 88fb is buggy, dev hsr_slave_1 [ 109.840123] protocol 88fb is buggy, dev hsr_slave_0 [ 109.845270] protocol 88fb is buggy, dev hsr_slave_1 [ 109.850439] protocol 88fb is buggy, dev hsr_slave_0 [ 109.855500] protocol 88fb is buggy, dev hsr_slave_1 [ 110.000149] protocol 88fb is buggy, dev hsr_slave_0 03:20:25 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:25 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 03:20:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = gettid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r2 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r3 = dup(r2) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r3, &(0x7f0000000000)='\x00', &(0x7f0000000140), 0x0, 0x1000) tkill(r1, 0x18) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 03:20:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x2, &(0x7f0000000200)=0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x806, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_submit(r2, 0x8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0x65}]) [ 110.970892] audit: type=1804 audit(1570677625.403:48): pid=7278 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir160846937/syzkaller.o246qq/8/file0" dev="sda1" ino=16578 res=1 03:20:25 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) r5 = dup2(r0, r4) bind$bt_rfcomm(r5, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) 03:20:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:25 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x2, &(0x7f0000000200)=0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x806, 0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_submit(r2, 0x8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0x65}]) 03:20:25 executing program 1: r0 = getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:25 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$UHID_CREATE(r1, &(0x7f0000000340)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0}, 0x120) 03:20:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x41) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000200)={0x0, 0x7, 0x4}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 03:20:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = gettid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r2 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r3 = dup(r2) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r3, &(0x7f0000000000)='\x00', &(0x7f0000000140), 0x0, 0x1000) tkill(r1, 0x18) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 03:20:26 executing program 1: r0 = getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xd8a}) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 03:20:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4ab12f728db4b2b4d2f2fba4fad0b3a47006db763", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:20:27 executing program 1: r0 = getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = gettid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r2 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r3 = dup(r2) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r3, &(0x7f0000000000)='\x00', &(0x7f0000000140), 0x0, 0x1000) tkill(r1, 0x18) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 03:20:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="2400000066000111000000000000000200000000", @ANYRES32=r2, @ANYBLOB='\x00'/12], 0x24}}, 0x0) [ 113.916586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=102 sclass=netlink_route_socket pig=7424 comm=syz-executor.2 [ 114.000107] net_ratelimit: 19 callbacks suppressed [ 114.000113] protocol 88fb is buggy, dev hsr_slave_0 [ 114.010668] protocol 88fb is buggy, dev hsr_slave_1 [ 114.015756] protocol 88fb is buggy, dev hsr_slave_0 [ 114.020868] protocol 88fb is buggy, dev hsr_slave_1 [ 114.160122] protocol 88fb is buggy, dev hsr_slave_0 [ 114.165255] protocol 88fb is buggy, dev hsr_slave_1 [ 114.320671] protocol 88fb is buggy, dev hsr_slave_0 [ 114.326166] protocol 88fb is buggy, dev hsr_slave_1 [ 114.720120] protocol 88fb is buggy, dev hsr_slave_0 [ 114.725244] protocol 88fb is buggy, dev hsr_slave_1 03:20:30 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e003580020000005e510befccd7", 0x2e}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) write$cgroup_int(r2, &(0x7f0000000080)=0xffffffffffffffff, 0x12) 03:20:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="a4ab12f728db4b2b4d2f2fba4fad0b3a47006db7", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:20:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000b000)={0x0, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 03:20:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:30 executing program 0: 03:20:30 executing program 0: 03:20:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 115.806379] audit: type=1804 audit(1570677630.233:49): pid=7475 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/13/memory.events" dev="sda1" ino=16652 res=1 03:20:30 executing program 0: [ 116.142431] audit: type=1804 audit(1570677630.583:50): pid=7483 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/13/memory.events" dev="sda1" ino=16652 res=1 [ 116.151187] syz-executor.4 (7475) used greatest stack depth: 24080 bytes left 03:20:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:33 executing program 0: 03:20:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:33 executing program 0: [ 118.650091] audit: type=1804 audit(1570677633.083:51): pid=7509 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/14/memory.events" dev="sda1" ino=16667 res=1 03:20:33 executing program 0: 03:20:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:33 executing program 0: [ 118.914851] audit: type=1804 audit(1570677633.173:52): pid=7518 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir610066718/syzkaller.shqI3r/25/memory.events" dev="sda1" ino=16668 res=1 [ 119.130323] net_ratelimit: 24 callbacks suppressed [ 119.130341] protocol 88fb is buggy, dev hsr_slave_0 [ 119.140881] protocol 88fb is buggy, dev hsr_slave_1 03:20:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:33 executing program 0: 03:20:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:33 executing program 0: 03:20:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, 0x0) 03:20:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 119.491216] audit: type=1804 audit(1570677633.923:53): pid=7551 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir610066718/syzkaller.shqI3r/26/memory.events" dev="sda1" ino=16671 res=1 03:20:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:34 executing program 0: [ 119.676770] EXT4-fs (sda1): re-mounted. Opts: [ 119.699559] audit: type=1804 audit(1570677634.133:54): pid=7569 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/15/memory.events" dev="sda1" ino=16674 res=1 03:20:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:34 executing program 0: 03:20:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, 0x0) [ 120.240139] protocol 88fb is buggy, dev hsr_slave_0 [ 120.245287] protocol 88fb is buggy, dev hsr_slave_1 [ 120.250387] protocol 88fb is buggy, dev hsr_slave_0 [ 120.255412] protocol 88fb is buggy, dev hsr_slave_1 [ 120.287118] EXT4-fs (sda1): re-mounted. Opts: 03:20:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:34 executing program 0: 03:20:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, 0x0) 03:20:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 120.367016] audit: type=1804 audit(1570677634.803:55): pid=7590 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir610066718/syzkaller.shqI3r/27/memory.events" dev="sda1" ino=16677 res=1 [ 120.400135] protocol 88fb is buggy, dev hsr_slave_0 [ 120.405261] protocol 88fb is buggy, dev hsr_slave_1 03:20:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:34 executing program 0: [ 120.503882] EXT4-fs (sda1): re-mounted. Opts: [ 120.525776] audit: type=1804 audit(1570677634.963:56): pid=7605 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/16/memory.events" dev="sda1" ino=16666 res=1 [ 120.560143] protocol 88fb is buggy, dev hsr_slave_0 [ 120.565264] protocol 88fb is buggy, dev hsr_slave_1 03:20:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) 03:20:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[], [], 0x700}) 03:20:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:35 executing program 0: [ 121.070600] EXT4-fs (sda1): re-mounted. Opts: [ 121.136201] audit: type=1804 audit(1570677635.573:57): pid=7631 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir610066718/syzkaller.shqI3r/28/memory.events" dev="sda1" ino=16611 res=1 03:20:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) 03:20:35 executing program 0: 03:20:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[], [], 0x700}) 03:20:35 executing program 0: 03:20:35 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 121.333958] EXT4-fs (sda1): re-mounted. Opts: [ 121.509500] audit: type=1804 audit(1570677635.943:58): pid=7647 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/17/memory.events" dev="sda1" ino=16675 res=1 03:20:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) 03:20:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[], [], 0x700}) 03:20:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:36 executing program 0: 03:20:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 121.737471] EXT4-fs (sda1): re-mounted. Opts: [ 121.779007] audit: type=1804 audit(1570677636.213:59): pid=7672 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir610066718/syzkaller.shqI3r/29/memory.events" dev="sda1" ino=16611 res=1 03:20:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) 03:20:36 executing program 0: 03:20:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:36 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000400)) inotify_init() fcntl$setstatus(r2, 0x4, 0x6100) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080), 0x4) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r5, &(0x7f0000000040), 0x8000fffffffe) socket$inet6(0xa, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) r6 = socket$inet6(0xa, 0x480040004000, 0x6) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r7, 0xffffffffffffffff, 0x0, 0x0) write(r7, &(0x7f00000001c0), 0xfffffef3) fcntl$lock(r7, 0x24, &(0x7f0000000100)={0x1, 0x1, 0xd95}) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000002780)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000002880)=0xe8) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000340)={r8, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0xa5cc554) 03:20:36 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x1e, 0x0, 0x0) 03:20:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 122.335215] audit: type=1804 audit(1570677636.763:60): pid=7689 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/18/memory.events" dev="sda1" ino=16675 res=1 03:20:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) socket$kcm(0x10, 0x3, 0x0) 03:20:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:37 executing program 0: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000180), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[{0x10, 0x0, 0x5}], 0x10}, 0x4000000) r1 = socket$kcm(0x29, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) close(0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) sendmsg(r1, 0x0, 0x0) 03:20:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 122.714383] audit: type=1804 audit(1570677637.143:61): pid=7717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir610066718/syzkaller.shqI3r/30/memory.events" dev="sda1" ino=16705 res=1 03:20:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) 03:20:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:37 executing program 0: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000180), 0x4) [ 123.018997] sctp: [Deprecated]: syz-executor.0 (pid 7740) Use of int in maxseg socket option. [ 123.018997] Use struct sctp_assoc_value instead [ 123.035879] sctp: [Deprecated]: syz-executor.0 (pid 7741) Use of int in maxseg socket option. [ 123.035879] Use struct sctp_assoc_value instead 03:20:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:37 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000180), 0x4) close(0xffffffffffffffff) [ 123.064538] audit: type=1804 audit(1570677637.503:62): pid=7739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/19/memory.events" dev="sda1" ino=16699 res=1 03:20:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 123.188285] sctp: [Deprecated]: syz-executor.0 (pid 7753) Use of int in maxseg socket option. [ 123.188285] Use struct sctp_assoc_value instead [ 123.244990] sctp: [Deprecated]: syz-executor.0 (pid 7753) Use of int in maxseg socket option. [ 123.244990] Use struct sctp_assoc_value instead 03:20:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) 03:20:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 123.429849] audit: type=1804 audit(1570677637.863:63): pid=7769 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/20/memory.events" dev="sda1" ino=16700 res=1 [ 123.492537] audit: type=1804 audit(1570677637.923:64): pid=7775 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir610066718/syzkaller.shqI3r/31/memory.events" dev="sda1" ino=16703 res=1 03:20:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:38 executing program 3 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 123.789223] FAULT_INJECTION: forcing a failure. [ 123.789223] name failslab, interval 1, probability 0, space 0, times 1 [ 123.896931] CPU: 1 PID: 7799 Comm: syz-executor.3 Not tainted 4.14.148 #0 [ 123.904026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.913394] Call Trace: [ 123.916000] dump_stack+0x138/0x197 [ 123.919649] should_fail.cold+0x10f/0x159 [ 123.923820] should_failslab+0xdb/0x130 [ 123.927813] __kmalloc+0x2f0/0x7a0 [ 123.931363] ? __sb_end_write+0xc1/0x100 [ 123.935431] ? strnlen_user+0x12f/0x1a0 [ 123.939412] ? SyS_memfd_create+0xba/0x3a0 [ 123.943656] SyS_memfd_create+0xba/0x3a0 [ 123.947723] ? shmem_fcntl+0x130/0x130 [ 123.951609] ? do_syscall_64+0x53/0x640 [ 123.955616] ? shmem_fcntl+0x130/0x130 [ 123.959508] do_syscall_64+0x1e8/0x640 [ 123.963405] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 123.968267] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 123.973468] RIP: 0033:0x459a59 [ 123.976663] RSP: 002b:00007f4904c8ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 123.984387] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a59 [ 123.991664] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 123.998943] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 124.006215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4904c8d6d4 [ 124.013486] R13: 00000000004c8dfc R14: 00000000004e0260 R15: 0000000000000003 03:20:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) 03:20:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) 03:20:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:38 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000001a40)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) 03:20:38 executing program 3 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:38 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpu.weight.nice\x00', 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x80000000, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0xc3) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1000, 0xbe3703cdf3179202) r3 = syz_open_dev$swradio(&(0x7f0000000580)='/dev/swradio#\x00', 0x1, 0x2) readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/43, 0x200000ab}], 0x1) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) r4 = syz_open_dev$swradio(&(0x7f0000000580)='/dev/swradio#\x00', 0x1, 0x2) readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/43, 0x200000ab}], 0x1) ioctl$SNDRV_CTL_IOCTL_PVERSION(r4, 0x80045500, &(0x7f0000000200)) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000140)=@req={0xffffffffffffff5e, &(0x7f0000000240)={'`\xaf\x8c\xe7\x00\x00\x01\x01\x00', @ifru_settings={0x1557, 0xfffffff7, @fr_pvc_info=&(0x7f0000000100)={0x65ac, 'bcsf0\xcf\f\x9e\x8c\xa8\x12\x8a\xe3\x00'}}}}) lseek(r1, 0x0, 0x3) 03:20:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 124.313471] FAULT_INJECTION: forcing a failure. [ 124.313471] name failslab, interval 1, probability 0, space 0, times 0 [ 124.334109] audit: type=1804 audit(1570677638.763:65): pid=7823 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir987096064/syzkaller.V0hJEt/21/memory.events" dev="sda1" ino=16698 res=1 [ 124.400123] net_ratelimit: 16 callbacks suppressed [ 124.400128] protocol 88fb is buggy, dev hsr_slave_0 [ 124.400319] CPU: 1 PID: 7822 Comm: syz-executor.3 Not tainted 4.14.148 #0 [ 124.405293] protocol 88fb is buggy, dev hsr_slave_1 [ 124.410126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.410131] Call Trace: [ 124.410150] dump_stack+0x138/0x197 [ 124.410169] should_fail.cold+0x10f/0x159 [ 124.410183] should_failslab+0xdb/0x130 [ 124.410196] kmem_cache_alloc+0x2d7/0x780 [ 124.417242] protocol 88fb is buggy, dev hsr_slave_0 [ 124.422125] ? __alloc_fd+0x1d4/0x4a0 [ 124.422140] __d_alloc+0x2d/0x9f0 [ 124.422150] ? lock_downgrade+0x740/0x740 [ 124.422162] d_alloc_pseudo+0x1e/0x30 [ 124.431556] protocol 88fb is buggy, dev hsr_slave_1 [ 124.434068] __shmem_file_setup.part.0+0xd8/0x400 [ 124.455405] Unknown ioctl 21521 [ 124.458720] ? __alloc_fd+0x1d4/0x4a0 [ 124.458734] ? shmem_fill_super+0x8c0/0x8c0 [ 124.458752] SyS_memfd_create+0x1f9/0x3a0 [ 124.458762] ? shmem_fcntl+0x130/0x130 03:20:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 124.458777] ? do_syscall_64+0x53/0x640 [ 124.499374] ? shmem_fcntl+0x130/0x130 [ 124.499391] do_syscall_64+0x1e8/0x640 [ 124.499401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 124.499418] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 124.499428] RIP: 0033:0x459a59 [ 124.524343] RSP: 002b:00007f4904c8ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 124.532067] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a59 [ 124.539346] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 124.546656] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 124.553939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4904c8d6d4 [ 124.561213] R13: 00000000004c8dfc R14: 00000000004e0260 R15: 0000000000000003 [ 124.561406] protocol 88fb is buggy, dev hsr_slave_0 [ 124.573708] protocol 88fb is buggy, dev hsr_slave_1 [ 124.594395] audit: type=1804 audit(1570677638.813:66): pid=7819 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir610066718/syzkaller.shqI3r/32/memory.events" dev="sda1" ino=16691 res=1 03:20:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 124.699654] Unknown ioctl 21521 03:20:39 executing program 3 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) [ 124.720121] protocol 88fb is buggy, dev hsr_slave_0 [ 124.725455] protocol 88fb is buggy, dev hsr_slave_1 [ 124.820710] FAULT_INJECTION: forcing a failure. [ 124.820710] name failslab, interval 1, probability 0, space 0, times 0 [ 124.891418] CPU: 1 PID: 7848 Comm: syz-executor.3 Not tainted 4.14.148 #0 [ 124.898415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.908070] Call Trace: [ 124.910675] dump_stack+0x138/0x197 [ 124.914351] should_fail.cold+0x10f/0x159 [ 124.918518] should_failslab+0xdb/0x130 [ 124.922509] kmem_cache_alloc+0x2d7/0x780 [ 124.926673] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 124.932141] ? rcu_read_lock_sched_held+0x110/0x130 [ 124.937162] ? shmem_destroy_callback+0xa0/0xa0 [ 124.941840] shmem_alloc_inode+0x1c/0x50 [ 124.945900] alloc_inode+0x64/0x180 [ 124.949619] new_inode_pseudo+0x19/0xf0 [ 124.953599] new_inode+0x1f/0x40 [ 124.956966] shmem_get_inode+0x75/0x750 [ 124.960977] __shmem_file_setup.part.0+0x111/0x400 [ 124.965911] ? __alloc_fd+0x1d4/0x4a0 [ 124.969713] ? shmem_fill_super+0x8c0/0x8c0 [ 124.974049] SyS_memfd_create+0x1f9/0x3a0 [ 124.978196] ? shmem_fcntl+0x130/0x130 [ 124.982091] ? do_syscall_64+0x53/0x640 [ 124.986066] ? shmem_fcntl+0x130/0x130 [ 124.989954] do_syscall_64+0x1e8/0x640 [ 124.993839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 124.998697] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 125.003893] RIP: 0033:0x459a59 [ 125.007084] RSP: 002b:00007f4904c8ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 125.014809] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a59 [ 125.022088] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 125.029361] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 03:20:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 03:20:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x2) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 03:20:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 125.036649] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4904c8d6d4 [ 125.043925] R13: 00000000004c8dfc R14: 00000000004e0260 R15: 0000000000000003 [ 125.120140] protocol 88fb is buggy, dev hsr_slave_0 [ 125.125282] protocol 88fb is buggy, dev hsr_slave_1 03:20:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100068, 0x500001c) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffff9c, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) close(r3) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x0, 0x9c, &(0x7f0000000000), &(0x7f0000000440)=""/156, 0x0, 0x0, 0x0, 0x16, 0x0, &(0x7f0000000500)="3b9fb227d445acf357a6274ab1d1f3393d80efdb8216"}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r4 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) 03:20:39 executing program 3 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xacc4e2, &(0x7f00000002c0)={[{@barrier_val={'barrier'}}], [], 0x700}) 03:20:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) [ 125.261850] FAULT_INJECTION: forcing a failure. [ 125.261850] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 125.273712] CPU: 0 PID: 7864 Comm: syz-executor.3 Not tainted 4.14.148 #0 [ 125.281604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.290973] Call Trace: [ 125.293574] dump_stack+0x138/0x197 [ 125.297223] should_fail.cold+0x10f/0x159 [ 125.301385] __alloc_pages_nodemask+0x1d6/0x7a0 [ 125.306058] ? fs_reclaim_acquire+0x20/0x20 [ 125.310372] ? __alloc_pages_slowpath+0x2930/0x2930 [ 125.315395] cache_grow_begin+0x80/0x400 [ 125.319448] kmem_cache_alloc+0x6a6/0x780 [ 125.323592] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 125.329045] ? shmem_destroy_callback+0xa0/0xa0 [ 125.333730] shmem_alloc_inode+0x1c/0x50 [ 125.337866] alloc_inode+0x64/0x180 [ 125.341482] new_inode_pseudo+0x19/0xf0 [ 125.345440] new_inode+0x1f/0x40 [ 125.348788] shmem_get_inode+0x75/0x750 [ 125.352849] __shmem_file_setup.part.0+0x111/0x400 [ 125.357789] ? __alloc_fd+0x1d4/0x4a0 [ 125.361631] ? shmem_fill_super+0x8c0/0x8c0 [ 125.365957] SyS_memfd_create+0x1f9/0x3a0 [ 125.370086] ? shmem_fcntl+0x130/0x130 [ 125.373957] ? do_syscall_64+0x53/0x640 [ 125.377933] ? shmem_fcntl+0x130/0x130 [ 125.381815] do_syscall_64+0x1e8/0x640 [ 125.385693] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 125.390526] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 125.395699] RIP: 0033:0x459a59 [ 125.398870] RSP: 002b:00007f4904c8ca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 125.406568] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a59 [ 125.413823] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be9b7 [ 125.421081] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 125.428477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4904c8d6d4 [ 125.435738] R13: 00000000004c8dfc R14: 00000000004e0260 R15: 0000000000000003 [ 125.461392] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, [ 129.600218] net_ratelimit: 24 callbacks suppressed [ 129.600222] protocol 88fb is buggy, dev hsr_slave_0 [ 129.610295] protocol 88fb is buggy, dev hsr_slave_1 [ 130.640213] protocol 88fb is buggy, dev hsr_slave_0 [ 130.645504] protocol 88fb is buggy, dev hsr_slave_1 [ 130.650658] protocol 88fb is buggy, dev hsr_slave_0 [ 130.655738] protocol 88fb is buggy, dev hsr_slave_1 [ 130.800193] protocol 88fb is buggy, dev hsr_slave_0 [ 130.805549] protocol 88fb is buggy, dev hsr_slave_1 [ 130.960201] protocol 88fb is buggy, dev hsr_slave_0 [ 130.965328] protocol 88fb is buggy, dev hsr_slave_1 [ 134.800228] net_ratelimit: 16 callbacks suppressed [ 134.805231] protocol 88fb is buggy, dev hsr_slave_0 [ 134.810377] protocol 88fb is buggy, dev hsr_slave_1 [ 134.815550] protocol 88fb is buggy, dev hsr_slave_0 [ 134.820702] protocol 88fb is buggy, dev hsr_slave_1 [ 134.960183] protocol 88fb is buggy, dev hsr_slave_0 [ 134.965272] protocol 88fb is buggy, dev hsr_slave_1 [ 135.120214] protocol 88fb is buggy, dev hsr_slave_0 [ 135.125380] protocol 88fb is buggy, dev hsr_slave_1 [ 135.520319] protocol 88fb is buggy, dev hsr_slave_0 [ 135.525449] protocol 88fb is buggy, dev hsr_slave_1 [ 140.000213] net_ratelimit: 24 callbacks suppressed [ 140.005226] protocol 88fb is buggy, dev hsr_slave_0 [ 140.010318] protocol 88fb is buggy, dev hsr_slave_1 [ 141.040235] protocol 88fb is buggy, dev hsr_slave_0 [ 141.045363] protocol 88fb is buggy, dev hsr_slave_1 [ 141.050567] protocol 88fb is buggy, dev hsr_slave_0 [ 141.055606] protocol 88fb is buggy, dev hsr_slave_1 [ 141.200207] protocol 88fb is buggy, dev hsr_slave_0 [ 141.205320] protocol 88fb is buggy, dev hsr_slave_1 [ 141.360194] protocol 88fb is buggy, dev hsr_slave_0 [ 141.365326] protocol 88fb is buggy, dev hsr_slave_1 [ 145.200235] net_ratelimit: 16 callbacks suppressed [ 145.205244] protocol 88fb is buggy, dev hsr_slave_0 [ 145.210354] protocol 88fb is buggy, dev hsr_slave_1 [ 145.215459] protocol 88fb is buggy, dev hsr_slave_0 [ 145.220533] protocol 88fb is buggy, dev hsr_slave_1 [ 145.360151] protocol 88fb is buggy, dev hsr_slave_0 [ 145.367751] protocol 88fb is buggy, dev hsr_slave_1 [ 145.520175] protocol 88fb is buggy, dev hsr_slave_0 [ 145.525321] protocol 88fb is buggy, dev hsr_slave_1 [ 145.920191] protocol 88fb is buggy, dev hsr_slave_0 [ 145.925339] protocol 88fb is buggy, dev hsr_slave_1 [ 150.400195] net_ratelimit: 24 callbacks suppressed [ 150.405216] protocol 88fb is buggy, dev hsr_slave_0 [ 150.410339] protocol 88fb is buggy, dev hsr_slave_1 [ 151.440213] protocol 88fb is buggy, dev hsr_slave_0 [ 151.445447] protocol 88fb is buggy, dev hsr_slave_1 [ 151.450589] protocol 88fb is buggy, dev hsr_slave_0 [ 151.455636] protocol 88fb is buggy, dev hsr_slave_1 [ 151.600190] protocol 88fb is buggy, dev hsr_slave_0 [ 151.605306] protocol 88fb is buggy, dev hsr_slave_1 [ 151.760213] protocol 88fb is buggy, dev hsr_slave_0 [ 151.765304] protocol 88fb is buggy, dev hsr_slave_1 [ 155.600206] net_ratelimit: 16 callbacks suppressed [ 155.605270] protocol 88fb is buggy, dev hsr_slave_0 [ 155.610369] protocol 88fb is buggy, dev hsr_slave_1 [ 155.615444] protocol 88fb is buggy, dev hsr_slave_0 [ 155.620525] protocol 88fb is buggy, dev hsr_slave_1 [ 155.760159] protocol 88fb is buggy, dev hsr_slave_0 [ 155.765233] protocol 88fb is buggy, dev hsr_slave_1 [ 155.920198] protocol 88fb is buggy, dev hsr_slave_0 [ 155.925378] protocol 88fb is buggy, dev hsr_slave_1 [ 156.320192] protocol 88fb is buggy, dev hsr_slave_0 [ 156.325296] protocol 88fb is buggy, dev hsr_slave_1 [ 160.800209] net_ratelimit: 24 callbacks suppressed [ 160.805220] protocol 88fb is buggy, dev hsr_slave_0 [ 160.810351] protocol 88fb is buggy, dev hsr_slave_1 [ 161.840224] protocol 88fb is buggy, dev hsr_slave_0 [ 161.845369] protocol 88fb is buggy, dev hsr_slave_1 [ 161.850727] protocol 88fb is buggy, dev hsr_slave_0 [ 161.855928] protocol 88fb is buggy, dev hsr_slave_1 [ 162.000196] protocol 88fb is buggy, dev hsr_slave_0 [ 162.005277] protocol 88fb is buggy, dev hsr_slave_1 [ 162.160196] protocol 88fb is buggy, dev hsr_slave_0 [ 162.165460] protocol 88fb is buggy, dev hsr_slave_1 [ 166.000204] net_ratelimit: 16 callbacks suppressed [ 166.000210] protocol 88fb is buggy, dev hsr_slave_0 [ 166.010248] protocol 88fb is buggy, dev hsr_slave_1 [ 166.017902] protocol 88fb is buggy, dev hsr_slave_0 [ 166.023101] protocol 88fb is buggy, dev hsr_slave_1 [ 166.160175] protocol 88fb is buggy, dev hsr_slave_0 [ 166.165255] protocol 88fb is buggy, dev hsr_slave_1 [ 166.320219] protocol 88fb is buggy, dev hsr_slave_0 [ 166.325472] protocol 88fb is buggy, dev hsr_slave_1 [ 166.720238] protocol 88fb is buggy, dev hsr_slave_0 [ 166.725508] protocol 88fb is buggy, dev hsr_slave_1 [ 171.200236] net_ratelimit: 24 callbacks suppressed [ 171.200242] protocol 88fb is buggy, dev hsr_slave_0 [ 171.210294] protocol 88fb is buggy, dev hsr_slave_1 [ 172.240238] protocol 88fb is buggy, dev hsr_slave_0 [ 172.245352] protocol 88fb is buggy, dev hsr_slave_1 [ 172.250531] protocol 88fb is buggy, dev hsr_slave_0 [ 172.255575] protocol 88fb is buggy, dev hsr_slave_1 [ 172.400210] protocol 88fb is buggy, dev hsr_slave_0 [ 172.405404] protocol 88fb is buggy, dev hsr_slave_1 [ 172.560216] protocol 88fb is buggy, dev hsr_slave_0 [ 172.565313] protocol 88fb is buggy, dev hsr_slave_1 [ 176.400215] net_ratelimit: 16 callbacks suppressed [ 176.400222] protocol 88fb is buggy, dev hsr_slave_0 [ 176.410313] protocol 88fb is buggy, dev hsr_slave_1 [ 176.415380] protocol 88fb is buggy, dev hsr_slave_0 [ 176.420457] protocol 88fb is buggy, dev hsr_slave_1 [ 176.560182] protocol 88fb is buggy, dev hsr_slave_0 [ 176.565340] protocol 88fb is buggy, dev hsr_slave_1 [ 176.720197] protocol 88fb is buggy, dev hsr_slave_0 [ 176.725452] protocol 88fb is buggy, dev hsr_slave_1 [ 177.120279] protocol 88fb is buggy, dev hsr_slave_0 [ 177.125556] protocol 88fb is buggy, dev hsr_slave_1 [ 181.600208] net_ratelimit: 24 callbacks suppressed [ 181.605215] protocol 88fb is buggy, dev hsr_slave_0 [ 181.610346] protocol 88fb is buggy, dev hsr_slave_1 [ 182.640224] protocol 88fb is buggy, dev hsr_slave_0 [ 182.645369] protocol 88fb is buggy, dev hsr_slave_1 [ 182.650501] protocol 88fb is buggy, dev hsr_slave_0 [ 182.655581] protocol 88fb is buggy, dev hsr_slave_1 [ 182.800188] protocol 88fb is buggy, dev hsr_slave_0 [ 182.805606] protocol 88fb is buggy, dev hsr_slave_1 [ 182.960222] protocol 88fb is buggy, dev hsr_slave_0 [ 182.965480] protocol 88fb is buggy, dev hsr_slave_1 [ 186.800221] net_ratelimit: 16 callbacks suppressed [ 186.800227] protocol 88fb is buggy, dev hsr_slave_0 [ 186.810276] protocol 88fb is buggy, dev hsr_slave_1 [ 186.815336] protocol 88fb is buggy, dev hsr_slave_0 [ 186.820426] protocol 88fb is buggy, dev hsr_slave_1 [ 186.960209] protocol 88fb is buggy, dev hsr_slave_0 [ 186.965413] protocol 88fb is buggy, dev hsr_slave_1 [ 187.120212] protocol 88fb is buggy, dev hsr_slave_0 [ 187.125294] protocol 88fb is buggy, dev hsr_slave_1 [ 187.520205] protocol 88fb is buggy, dev hsr_slave_0 [ 187.525337] protocol 88fb is buggy, dev hsr_slave_1 [ 192.000169] net_ratelimit: 24 callbacks suppressed [ 192.000175] protocol 88fb is buggy, dev hsr_slave_0 [ 192.010212] protocol 88fb is buggy, dev hsr_slave_1 [ 193.040225] protocol 88fb is buggy, dev hsr_slave_0 [ 193.045333] protocol 88fb is buggy, dev hsr_slave_1 [ 193.050486] protocol 88fb is buggy, dev hsr_slave_0 [ 193.055537] protocol 88fb is buggy, dev hsr_slave_1 [ 193.200181] protocol 88fb is buggy, dev hsr_slave_0 [ 193.205312] protocol 88fb is buggy, dev hsr_slave_1 [ 193.360221] protocol 88fb is buggy, dev hsr_slave_0 [ 193.365332] protocol 88fb is buggy, dev hsr_slave_1 [ 197.200246] net_ratelimit: 16 callbacks suppressed [ 197.200252] protocol 88fb is buggy, dev hsr_slave_0 [ 197.210317] protocol 88fb is buggy, dev hsr_slave_1 [ 197.215374] protocol 88fb is buggy, dev hsr_slave_0 [ 197.220450] protocol 88fb is buggy, dev hsr_slave_1 [ 197.360183] protocol 88fb is buggy, dev hsr_slave_0 [ 197.365491] protocol 88fb is buggy, dev hsr_slave_1 [ 197.520189] protocol 88fb is buggy, dev hsr_slave_0 [ 197.525320] protocol 88fb is buggy, dev hsr_slave_1 [ 197.920231] protocol 88fb is buggy, dev hsr_slave_0 [ 197.925388] protocol 88fb is buggy, dev hsr_slave_1 [ 202.400213] net_ratelimit: 24 callbacks suppressed [ 202.405231] protocol 88fb is buggy, dev hsr_slave_0 [ 202.410313] protocol 88fb is buggy, dev hsr_slave_1 [ 203.440220] protocol 88fb is buggy, dev hsr_slave_0 [ 203.445347] protocol 88fb is buggy, dev hsr_slave_1 [ 203.450488] protocol 88fb is buggy, dev hsr_slave_0 [ 203.455525] protocol 88fb is buggy, dev hsr_slave_1 [ 203.600198] protocol 88fb is buggy, dev hsr_slave_0 [ 203.605315] protocol 88fb is buggy, dev hsr_slave_1 [ 203.760176] protocol 88fb is buggy, dev hsr_slave_0 [ 203.765254] protocol 88fb is buggy, dev hsr_slave_1 [ 207.600214] net_ratelimit: 16 callbacks suppressed [ 207.600220] protocol 88fb is buggy, dev hsr_slave_0 [ 207.610278] protocol 88fb is buggy, dev hsr_slave_1 [ 207.616290] protocol 88fb is buggy, dev hsr_slave_0 [ 207.621370] protocol 88fb is buggy, dev hsr_slave_1 [ 207.760187] protocol 88fb is buggy, dev hsr_slave_0 [ 207.765302] protocol 88fb is buggy, dev hsr_slave_1 [ 207.920206] protocol 88fb is buggy, dev hsr_slave_0 [ 207.925305] protocol 88fb is buggy, dev hsr_slave_1 [ 208.320190] protocol 88fb is buggy, dev hsr_slave_0 [ 208.325279] protocol 88fb is buggy, dev hsr_slave_1 [ 212.800185] net_ratelimit: 24 callbacks suppressed [ 212.805194] protocol 88fb is buggy, dev hsr_slave_0 [ 212.810277] protocol 88fb is buggy, dev hsr_slave_1 [ 213.840213] protocol 88fb is buggy, dev hsr_slave_0 [ 213.845318] protocol 88fb is buggy, dev hsr_slave_1 [ 213.850512] protocol 88fb is buggy, dev hsr_slave_0 [ 213.855556] protocol 88fb is buggy, dev hsr_slave_1 [ 214.000186] protocol 88fb is buggy, dev hsr_slave_0 [ 214.005317] protocol 88fb is buggy, dev hsr_slave_1 [ 214.160178] protocol 88fb is buggy, dev hsr_slave_0 [ 214.165275] protocol 88fb is buggy, dev hsr_slave_1 [ 218.000210] net_ratelimit: 16 callbacks suppressed [ 218.000215] protocol 88fb is buggy, dev hsr_slave_0 [ 218.010488] protocol 88fb is buggy, dev hsr_slave_1 [ 218.015544] protocol 88fb is buggy, dev hsr_slave_0 [ 218.020645] protocol 88fb is buggy, dev hsr_slave_1 [ 218.160184] protocol 88fb is buggy, dev hsr_slave_0 [ 218.165342] protocol 88fb is buggy, dev hsr_slave_1 [ 218.320188] protocol 88fb is buggy, dev hsr_slave_0 [ 218.325276] protocol 88fb is buggy, dev hsr_slave_1 [ 218.720192] protocol 88fb is buggy, dev hsr_slave_0 [ 218.725283] protocol 88fb is buggy, dev hsr_slave_1 [ 223.202482] net_ratelimit: 24 callbacks suppressed [ 223.202489] protocol 88fb is buggy, dev hsr_slave_0 [ 223.212672] protocol 88fb is buggy, dev hsr_slave_1 [ 224.240219] protocol 88fb is buggy, dev hsr_slave_0 [ 224.245361] protocol 88fb is buggy, dev hsr_slave_1 [ 224.250488] protocol 88fb is buggy, dev hsr_slave_0 [ 224.255558] protocol 88fb is buggy, dev hsr_slave_1 [ 224.400186] protocol 88fb is buggy, dev hsr_slave_0 [ 224.405306] protocol 88fb is buggy, dev hsr_slave_1 [ 224.560196] protocol 88fb is buggy, dev hsr_slave_0 [ 224.565473] protocol 88fb is buggy, dev hsr_slave_1 [ 228.400211] net_ratelimit: 16 callbacks suppressed [ 228.400216] protocol 88fb is buggy, dev hsr_slave_0 [ 228.410255] protocol 88fb is buggy, dev hsr_slave_1 [ 228.415480] protocol 88fb is buggy, dev hsr_slave_0 [ 228.420577] protocol 88fb is buggy, dev hsr_slave_1 [ 228.560185] protocol 88fb is buggy, dev hsr_slave_0 [ 228.565352] protocol 88fb is buggy, dev hsr_slave_1 [ 228.720182] protocol 88fb is buggy, dev hsr_slave_0 [ 228.725264] protocol 88fb is buggy, dev hsr_slave_1 [ 229.120216] protocol 88fb is buggy, dev hsr_slave_0 [ 229.125342] protocol 88fb is buggy, dev hsr_slave_1 [ 233.600199] net_ratelimit: 24 callbacks suppressed [ 233.600205] protocol 88fb is buggy, dev hsr_slave_0 [ 233.610244] protocol 88fb is buggy, dev hsr_slave_1 [ 234.640230] protocol 88fb is buggy, dev hsr_slave_0 [ 234.645428] protocol 88fb is buggy, dev hsr_slave_1 [ 234.650639] protocol 88fb is buggy, dev hsr_slave_0 [ 234.655737] protocol 88fb is buggy, dev hsr_slave_1 [ 234.800179] protocol 88fb is buggy, dev hsr_slave_0 [ 234.805294] protocol 88fb is buggy, dev hsr_slave_1 [ 234.960191] protocol 88fb is buggy, dev hsr_slave_0 [ 234.965272] protocol 88fb is buggy, dev hsr_slave_1 [ 238.800237] net_ratelimit: 16 callbacks suppressed [ 238.800243] protocol 88fb is buggy, dev hsr_slave_0 [ 238.810321] protocol 88fb is buggy, dev hsr_slave_1 [ 238.815449] protocol 88fb is buggy, dev hsr_slave_0 [ 238.820632] protocol 88fb is buggy, dev hsr_slave_1 [ 238.960192] protocol 88fb is buggy, dev hsr_slave_0 [ 238.965302] protocol 88fb is buggy, dev hsr_slave_1 [ 239.120194] protocol 88fb is buggy, dev hsr_slave_0 [ 239.125281] protocol 88fb is buggy, dev hsr_slave_1 [ 239.520243] protocol 88fb is buggy, dev hsr_slave_0 [ 239.525412] protocol 88fb is buggy, dev hsr_slave_1 [ 244.000223] net_ratelimit: 24 callbacks suppressed [ 244.005363] protocol 88fb is buggy, dev hsr_slave_0 [ 244.010503] protocol 88fb is buggy, dev hsr_slave_1 [ 245.040242] protocol 88fb is buggy, dev hsr_slave_0 [ 245.045404] protocol 88fb is buggy, dev hsr_slave_1 [ 245.050586] protocol 88fb is buggy, dev hsr_slave_0 [ 245.055675] protocol 88fb is buggy, dev hsr_slave_1 [ 245.200218] protocol 88fb is buggy, dev hsr_slave_0 [ 245.205331] protocol 88fb is buggy, dev hsr_slave_1 [ 245.360211] protocol 88fb is buggy, dev hsr_slave_0 [ 245.365513] protocol 88fb is buggy, dev hsr_slave_1 [ 249.200275] net_ratelimit: 16 callbacks suppressed [ 249.200280] protocol 88fb is buggy, dev hsr_slave_0 [ 249.210351] protocol 88fb is buggy, dev hsr_slave_1 [ 249.215569] protocol 88fb is buggy, dev hsr_slave_0 [ 249.220671] protocol 88fb is buggy, dev hsr_slave_1 [ 249.360209] protocol 88fb is buggy, dev hsr_slave_0 [ 249.365347] protocol 88fb is buggy, dev hsr_slave_1 [ 249.520219] protocol 88fb is buggy, dev hsr_slave_0 [ 249.526290] protocol 88fb is buggy, dev hsr_slave_1 [ 249.920210] protocol 88fb is buggy, dev hsr_slave_0 [ 249.925348] protocol 88fb is buggy, dev hsr_slave_1 [ 254.400213] net_ratelimit: 24 callbacks suppressed [ 254.405261] protocol 88fb is buggy, dev hsr_slave_0 [ 254.410363] protocol 88fb is buggy, dev hsr_slave_1 [ 255.440207] protocol 88fb is buggy, dev hsr_slave_0 [ 255.445306] protocol 88fb is buggy, dev hsr_slave_1 [ 255.450447] protocol 88fb is buggy, dev hsr_slave_0 [ 255.455626] protocol 88fb is buggy, dev hsr_slave_1 [ 255.600193] protocol 88fb is buggy, dev hsr_slave_0 [ 255.605304] protocol 88fb is buggy, dev hsr_slave_1 [ 255.760197] protocol 88fb is buggy, dev hsr_slave_0 [ 255.765283] protocol 88fb is buggy, dev hsr_slave_1 [ 259.600234] net_ratelimit: 16 callbacks suppressed [ 259.600241] protocol 88fb is buggy, dev hsr_slave_0 [ 259.610340] protocol 88fb is buggy, dev hsr_slave_1 [ 259.615458] protocol 88fb is buggy, dev hsr_slave_0 [ 259.620581] protocol 88fb is buggy, dev hsr_slave_1 [ 259.760188] protocol 88fb is buggy, dev hsr_slave_0 [ 259.765274] protocol 88fb is buggy, dev hsr_slave_1 [ 259.920184] protocol 88fb is buggy, dev hsr_slave_0 [ 259.925300] protocol 88fb is buggy, dev hsr_slave_1 [ 260.320200] protocol 88fb is buggy, dev hsr_slave_0 [ 260.325442] protocol 88fb is buggy, dev hsr_slave_1 [ 264.800197] net_ratelimit: 24 callbacks suppressed [ 264.800202] protocol 88fb is buggy, dev hsr_slave_0 [ 264.810283] protocol 88fb is buggy, dev hsr_slave_1 [ 265.840212] protocol 88fb is buggy, dev hsr_slave_0 [ 265.845312] protocol 88fb is buggy, dev hsr_slave_1 [ 265.850494] protocol 88fb is buggy, dev hsr_slave_0 [ 265.855537] protocol 88fb is buggy, dev hsr_slave_1 [ 266.000179] protocol 88fb is buggy, dev hsr_slave_0 [ 266.005392] protocol 88fb is buggy, dev hsr_slave_1 [ 266.160214] protocol 88fb is buggy, dev hsr_slave_0 [ 266.165344] protocol 88fb is buggy, dev hsr_slave_1 [ 270.000200] net_ratelimit: 16 callbacks suppressed [ 270.000206] protocol 88fb is buggy, dev hsr_slave_0 [ 270.010249] protocol 88fb is buggy, dev hsr_slave_1 [ 270.015303] protocol 88fb is buggy, dev hsr_slave_0 [ 270.020380] protocol 88fb is buggy, dev hsr_slave_1 [ 270.160188] protocol 88fb is buggy, dev hsr_slave_0 [ 270.165328] protocol 88fb is buggy, dev hsr_slave_1 [ 270.320175] protocol 88fb is buggy, dev hsr_slave_0 [ 270.325322] protocol 88fb is buggy, dev hsr_slave_1 [ 270.720191] protocol 88fb is buggy, dev hsr_slave_0 [ 270.725311] protocol 88fb is buggy, dev hsr_slave_1 [ 275.200207] net_ratelimit: 24 callbacks suppressed [ 275.205208] protocol 88fb is buggy, dev hsr_slave_0 [ 275.210280] protocol 88fb is buggy, dev hsr_slave_1 [ 276.240229] protocol 88fb is buggy, dev hsr_slave_0 [ 276.245409] protocol 88fb is buggy, dev hsr_slave_1 [ 276.250589] protocol 88fb is buggy, dev hsr_slave_0 [ 276.255667] protocol 88fb is buggy, dev hsr_slave_1 [ 276.400202] protocol 88fb is buggy, dev hsr_slave_0 [ 276.405346] protocol 88fb is buggy, dev hsr_slave_1 [ 276.560240] protocol 88fb is buggy, dev hsr_slave_0 [ 276.565338] protocol 88fb is buggy, dev hsr_slave_1 [ 280.400231] net_ratelimit: 16 callbacks suppressed [ 280.405238] protocol 88fb is buggy, dev hsr_slave_0 [ 280.410352] protocol 88fb is buggy, dev hsr_slave_1 [ 280.415562] protocol 88fb is buggy, dev hsr_slave_0 [ 280.420618] protocol 88fb is buggy, dev hsr_slave_1 [ 280.560181] protocol 88fb is buggy, dev hsr_slave_0 [ 280.565290] protocol 88fb is buggy, dev hsr_slave_1 [ 280.720199] protocol 88fb is buggy, dev hsr_slave_0 [ 280.725523] protocol 88fb is buggy, dev hsr_slave_1 [ 281.120253] protocol 88fb is buggy, dev hsr_slave_0 [ 281.125373] protocol 88fb is buggy, dev hsr_slave_1 [ 284.640289] INFO: task syz-executor.0:7827 blocked for more than 140 seconds. [ 284.647753] Not tainted 4.14.148 #0 [ 284.652015] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 284.660079] syz-executor.0 D28488 7827 6859 0x00000006 [ 284.665715] Call Trace: [ 284.668396] __schedule+0x7b8/0x1cd0 [ 284.672192] ? pci_mmcfg_check_reserved+0x150/0x150 [ 284.677275] schedule+0x92/0x1c0 [ 284.680689] schedule_timeout+0x93b/0xe10 [ 284.684840] ? wait_for_completion+0x274/0x420 [ 284.689456] ? find_held_lock+0x35/0x130 [ 284.693567] ? usleep_range+0x130/0x130 [ 284.697532] ? wait_for_completion+0x274/0x420 [ 284.702202] ? _raw_spin_unlock_irq+0x28/0x90 [ 284.706698] ? trace_hardirqs_on_caller+0x400/0x590 [ 284.711772] wait_for_completion+0x27c/0x420 [ 284.716184] ? try_to_wake_up+0xa8/0xf90 [ 284.720319] ? wait_for_completion_interruptible+0x490/0x490 [ 284.726162] ? wake_up_q+0xf0/0xf0 [ 284.729702] kthread_stop+0xda/0x650 [ 284.733529] sdr_cap_stop_streaming+0x1fc/0x320 [ 284.738202] ? sdr_cap_buf_queue+0x230/0x230 [ 284.742717] __vb2_queue_cancel+0xa3/0x890 [ 284.747057] ? lock_downgrade+0x740/0x740 [ 284.751285] vb2_core_streamoff+0x52/0x110 [ 284.755521] __vb2_cleanup_fileio+0x78/0x150 [ 284.759915] vb2_core_queue_release+0x1d/0x80 [ 284.764592] _vb2_fop_release+0x1cf/0x2a0 [ 284.768747] vb2_fop_release+0x75/0xc0 [ 284.772681] vivid_fop_release+0x180/0x3f0 [ 284.776914] ? vivid_remove+0x3d0/0x3d0 [ 284.781013] ? dev_debug_store+0xe0/0xe0 [ 284.785075] v4l2_release+0xf9/0x190 [ 284.788772] __fput+0x275/0x7a0 [ 284.792083] ____fput+0x16/0x20 [ 284.795357] task_work_run+0x114/0x190 [ 284.799226] get_signal+0x18a8/0x1cd0 [ 284.803076] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 284.808521] ? vfs_readv+0xe0/0x130 [ 284.812188] ? rcu_read_lock_sched_held+0x110/0x130 [ 284.817196] ? kfree+0x20a/0x270 [ 284.820617] ? vfs_readv+0xe5/0x130 [ 284.824236] do_signal+0x86/0x19a0 [ 284.827767] ? setup_sigcontext+0x7d0/0x7d0 [ 284.832130] ? kick_process+0xef/0x180 [ 284.836013] ? task_work_add+0x8e/0xf0 [ 284.839886] ? fput+0xd4/0x150 [ 284.843125] ? do_readv+0x1af/0x2d0 [ 284.846752] ? exit_to_usermode_loop+0x3d/0x220 [ 284.851496] exit_to_usermode_loop+0x15c/0x220 [ 284.856081] do_syscall_64+0x4bc/0x640 [ 284.859957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.864850] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.870070] RIP: 0033:0x459a59 [ 284.873253] RSP: 002b:00007f1c362e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 284.881383] RAX: 0000000000008000 RBX: 0000000000000003 RCX: 0000000000459a59 [ 284.888674] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000004 [ 284.895999] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.903334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c362e26d4 [ 284.910636] R13: 00000000004c6fc3 R14: 00000000004dca50 R15: 00000000ffffffff [ 284.917920] [ 284.917920] Showing all locks held in the system: [ 284.924419] 1 lock held by khungtaskd/1015: [ 284.928885] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 284.937999] 2 locks held by getty/6813: [ 284.942013] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 284.950780] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 284.960227] 2 locks held by getty/6814: [ 284.964188] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 284.972912] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 284.982257] 2 locks held by getty/6815: [ 284.986207] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 284.994918] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 285.004275] 2 locks held by getty/6816: [ 285.008244] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 285.016951] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 285.026286] 2 locks held by getty/6817: [ 285.030292] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 285.038974] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 285.048311] 2 locks held by getty/6818: [ 285.052337] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 285.061102] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 285.070432] 2 locks held by getty/6819: [ 285.074383] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 285.085762] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 285.095111] [ 285.096725] ============================================= [ 285.096725] [ 285.103794] NMI backtrace for cpu 0 [ 285.107416] CPU: 0 PID: 1015 Comm: khungtaskd Not tainted 4.14.148 #0 [ 285.113977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.123327] Call Trace: [ 285.125966] dump_stack+0x138/0x197 [ 285.129575] nmi_cpu_backtrace.cold+0x57/0x94 [ 285.134097] ? irq_force_complete_move.cold+0x7d/0x7d [ 285.139267] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 285.144525] arch_trigger_cpumask_backtrace+0x14/0x20 [ 285.149747] watchdog+0x5e7/0xb90 [ 285.153183] kthread+0x319/0x430 [ 285.156543] ? hungtask_pm_notify+0x50/0x50 [ 285.160842] ? kthread_create_on_node+0xd0/0xd0 [ 285.165491] ret_from_fork+0x24/0x30 [ 285.169333] Sending NMI from CPU 0 to CPUs 1: [ 285.174156] NMI backtrace for cpu 1 [ 285.174160] CPU: 1 PID: 64 Comm: kworker/u4:2 Not tainted 4.14.148 #0 [ 285.174163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.174165] Workqueue: bat_events batadv_nc_worker [ 285.174169] task: ffff8880a9838180 task.stack: ffff8880a9840000 [ 285.174172] RIP: 0010:rcu_is_watching+0x10/0xb0 [ 285.174174] RSP: 0018:ffff8880a9847c58 EFLAGS: 00000282 [ 285.174178] RAX: ffff8880a9838180 RBX: ffff888081fd0940 RCX: 1ffffffff0f565b0 [ 285.174180] RDX: 0000000000000000 RSI: ffffffff869d3080 RDI: ffff8880a98389fc [ 285.174183] RBP: ffff8880a9847c68 R08: 0000000000000000 R09: ffff8880a9838a70 [ 285.174186] R10: ffff8880a9838a50 R11: ffff8880a9838180 R12: 0000000000000000 [ 285.174188] R13: ffff88806b525fa8 R14: ffff88806b525540 R15: dffffc0000000000 [ 285.174191] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 285.174194] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 285.174196] CR2: 00007f5c1641b140 CR3: 000000009565d000 CR4: 00000000001406e0 [ 285.174199] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 285.174202] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 285.174203] Call Trace: [ 285.174205] batadv_nc_process_nc_paths.part.0+0x2a2/0x340 [ 285.174208] ? batadv_nc_sniffed_purge+0x310/0x310 [ 285.174209] batadv_nc_worker+0x4bb/0x6d0 [ 285.174211] process_one_work+0x863/0x1600 [ 285.174213] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 285.174215] worker_thread+0x5d9/0x1050 [ 285.174217] kthread+0x319/0x430 [ 285.174219] ? process_one_work+0x1600/0x1600 [ 285.174221] ? kthread_create_on_node+0xd0/0xd0 [ 285.174223] ret_from_fork+0x24/0x30 [ 285.174224] Code: 48 83 c4 08 5b 5d c3 48 89 45 f0 e8 fb fd 38 00 48 8b 45 f0 eb cb 0f 1f 44 00 00 55 48 89 e5 53 48 83 ec 08 65 ff 05 f0 44 b4 7e bb e6 8a 01 48 c7 c3 40 39 02 00 48 ba 00 00 00 00 00 fc ff [ 285.175248] Kernel panic - not syncing: hung_task: blocked tasks [ 285.358096] CPU: 0 PID: 1015 Comm: khungtaskd Not tainted 4.14.148 #0 [ 285.364649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.373982] Call Trace: [ 285.376551] dump_stack+0x138/0x197 [ 285.380159] panic+0x1f2/0x426 [ 285.383330] ? add_taint.cold+0x16/0x16 [ 285.387280] ? ___preempt_schedule+0x16/0x18 [ 285.391687] watchdog+0x5f8/0xb90 [ 285.395122] kthread+0x319/0x430 [ 285.398461] ? hungtask_pm_notify+0x50/0x50 [ 285.402759] ? kthread_create_on_node+0xd0/0xd0 [ 285.407404] ret_from_fork+0x24/0x30 [ 285.412547] Kernel Offset: disabled [ 285.416176] Rebooting in 86400 seconds..