[info] Using makefile-style concurrent boot in runlevel 2. [ 26.546578] audit: type=1800 audit(1545642239.732:21): pid=5872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 26.581942] audit: type=1800 audit(1545642239.732:22): pid=5872 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.38' (ECDSA) to the list of known hosts. 2018/12/24 09:04:08 fuzzer started 2018/12/24 09:04:10 dialing manager at 10.128.0.26:34681 2018/12/24 09:04:11 syscalls: 1 2018/12/24 09:04:11 code coverage: enabled 2018/12/24 09:04:11 comparison tracing: enabled 2018/12/24 09:04:11 setuid sandbox: enabled 2018/12/24 09:04:11 namespace sandbox: enabled 2018/12/24 09:04:11 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/24 09:04:11 fault injection: enabled 2018/12/24 09:04:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/24 09:04:11 net packet injection: enabled 2018/12/24 09:04:11 net device setup: enabled 09:06:25 executing program 0: syzkaller login: [ 172.310490] IPVS: ftp: loaded support on port[0] = 21 09:06:25 executing program 1: [ 172.587154] IPVS: ftp: loaded support on port[0] = 21 09:06:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x1018}}, &(0x7f0000000000)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 172.910677] IPVS: ftp: loaded support on port[0] = 21 09:06:26 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x9c}) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0xfff, 0x41a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 173.190940] IPVS: ftp: loaded support on port[0] = 21 09:06:26 executing program 4: add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 09:06:26 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) [ 173.794871] IPVS: ftp: loaded support on port[0] = 21 [ 173.939279] IPVS: ftp: loaded support on port[0] = 21 [ 174.158679] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.200462] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.209675] device bridge_slave_0 entered promiscuous mode [ 174.342181] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.348559] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.362982] device bridge_slave_1 entered promiscuous mode [ 174.493691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 174.654329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 174.836478] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.861474] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.868961] device bridge_slave_0 entered promiscuous mode [ 174.960833] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.981358] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.000365] device bridge_slave_1 entered promiscuous mode [ 175.065414] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 175.136487] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.157567] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.173869] device bridge_slave_0 entered promiscuous mode [ 175.229011] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 175.246114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 175.286384] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.311537] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.332032] device bridge_slave_1 entered promiscuous mode [ 175.460576] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 175.497328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 175.522379] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.528811] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.545160] device bridge_slave_0 entered promiscuous mode [ 175.565347] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 175.615658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.653625] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 175.663749] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 175.674181] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.680737] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.698964] device bridge_slave_1 entered promiscuous mode [ 175.722912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 175.731451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.780135] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 175.848850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 175.934349] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.940770] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.950647] device bridge_slave_0 entered promiscuous mode [ 175.958234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 175.980248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.010575] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 176.081945] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 176.088815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.116264] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.125838] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.133727] device bridge_slave_1 entered promiscuous mode [ 176.147368] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.157555] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 176.174289] team0: Port device team_slave_0 added [ 176.215662] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.224096] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.238558] device bridge_slave_0 entered promiscuous mode [ 176.248753] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 176.265079] team0: Port device team_slave_1 added [ 176.308055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 176.352359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.370318] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 176.413457] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.420083] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.446293] device bridge_slave_1 entered promiscuous mode [ 176.463291] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.492495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 176.500389] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 176.532020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.543768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.562988] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.572538] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 176.582972] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 176.590361] team0: Port device team_slave_0 added [ 176.603481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.613738] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 176.669480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 176.701011] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 176.722517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.741906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.758959] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 176.769755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 176.777425] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 176.791645] team0: Port device team_slave_1 added [ 176.797373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.921377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 176.928251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.965703] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 176.991876] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 177.000040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.032564] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.043457] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 177.060862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.108330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 177.115958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.132403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.145253] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 177.157602] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.176109] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.195923] team0: Port device team_slave_0 added [ 177.250246] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 177.260160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.275967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.327772] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.356630] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 177.370650] team0: Port device team_slave_1 added [ 177.388815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 177.403141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.422302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.461866] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.473208] team0: Port device team_slave_0 added [ 177.532583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.593652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 177.600529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.670207] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 177.688965] team0: Port device team_slave_1 added [ 177.708123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 177.752611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.768345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.804108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 177.814370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 177.825735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.837756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.845958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.875012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.919613] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.929594] team0: Port device team_slave_0 added [ 177.943668] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 177.951231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.968294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.014999] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 178.032733] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.040166] team0: Port device team_slave_0 added [ 178.048155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.062014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.099781] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.122122] team0: Port device team_slave_1 added [ 178.129242] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.140901] team0: Port device team_slave_1 added [ 178.148057] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.173321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.181501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.213551] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.220020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.227060] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.233472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.247252] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 178.271960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.303394] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.332075] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.341406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.381825] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.422770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.461826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.503724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.533813] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.541858] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.563690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.601877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.632919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.653681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.673928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.689273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.716883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.752326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.776587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.792099] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.945694] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.952100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.958776] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.965210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.982384] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 179.464675] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.471052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.477784] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.484171] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.530708] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 179.555189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.576333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.952867] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.959256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.965953] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.972348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.991379] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.028220] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.034610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.041295] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.047662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.072733] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.083565] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.089914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.096639] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.103028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.112082] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 180.569369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.578399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.595245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.101103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.529891] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 183.654292] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.011872] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.019782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.041975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.077046] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.161580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.483646] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.490582] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.503066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.517264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.673232] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.771827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.882801] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.964132] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.060557] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.075296] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.096511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.105818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.231848] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.379746] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.409685] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.525466] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.619762] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.630458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.638036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.820825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.836569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.851285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.883095] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.903422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.910550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.072979] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.192898] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.300135] 8021q: adding VLAN 0 to HW filter on device team0 09:06:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:40 executing program 1: syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000600)) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) epoll_create(0x0) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8014000000000084) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000180)=0x8000, 0x8) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}}}, 0xa, 0x0, 0x0, 0x0, 0xd}, 0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0x9, @empty, 0x4}}}, &(0x7f0000000a00)=0x84) [ 187.683310] sctp: failed to load transform for md5: -4 09:06:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x1, &(0x7f0000008000)=@raw=[@jmp={0x5, 0x10001}], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 09:06:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:41 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000080)=0x7, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) [ 187.908827] hrtimer: interrupt took 40742 ns 09:06:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000000)) 09:06:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x81, 0x20000000000001, 0x8, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, 0x0, 0x0}, 0x20) 09:06:41 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e05411, 0x0) 09:06:42 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080), 0x4) 09:06:42 executing program 2: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x83102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = semget(0xffffffffffffffff, 0x3, 0x0) semtimedop(r1, &(0x7f0000000340)=[{0x2, 0xe8fa, 0x1000}], 0x1, &(0x7f0000000380)) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_ima(r0, 0x0, 0x0, 0x281, 0x0) rt_sigprocmask(0x100000000003, &(0x7f0000000280), 0x0, 0x35d) 09:06:42 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 09:06:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x22) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x8000000000002a7, 0x0) 09:06:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:42 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x2008000000004) writev(r0, &(0x7f0000000180)=[{&(0x7f00000002c0)="580000001400192340834b84043f679a10f61bcdf1e422000000000100804824ca945f64009400050028925aaa00ffb0c3c1654839dc78bb8083771ad9910000000000008400f0fffeff2c5d143f44ff04fffffffff40001", 0x58}], 0x1) 09:06:42 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:42 executing program 2: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x83102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = semget(0xffffffffffffffff, 0x3, 0x0) semtimedop(r1, &(0x7f0000000340)=[{0x2, 0xe8fa, 0x1000}], 0x1, &(0x7f0000000380)) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$security_ima(r0, 0x0, 0x0, 0x281, 0x0) rt_sigprocmask(0x100000000003, &(0x7f0000000280), 0x0, 0x35d) 09:06:42 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:42 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101005, 0x0) clock_gettime(0x2000000003, &(0x7f00000006c0)) ppoll(&(0x7f0000000340)=[{r0}], 0x1, 0x0, &(0x7f0000000400)={0x100000001}, 0x8) 09:06:42 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 09:06:42 executing program 5: socket$inet6(0xa, 0x803, 0x3) waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:42 executing program 5: socket$inet6(0xa, 0x803, 0x3) waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:42 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6(0xa, 0x0, 0x1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) clone(0x210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffdb, 0x0, 0x0, 0x0, 0x0, 0x5d, 0xa0ffffff00000000, 0xff00}}, &(0x7f0000000080)='GPL\x00', 0x5}, 0x48) [ 189.618571] kauditd_printk_skb: 8 callbacks suppressed [ 189.618584] audit: type=1804 audit(1545642402.802:31): pid=7673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/7/file0" dev="sda1" ino=16539 res=1 [ 189.709623] audit: type=1804 audit(1545642402.812:32): pid=7673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/7/file0" dev="sda1" ino=16543 res=1 09:06:43 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000000)) 09:06:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:43 executing program 5: socket$inet6(0xa, 0x803, 0x3) waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:43 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:43 executing program 4: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x127) r3 = socket$inet(0x2, 0x4000000000000801, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, 0xffffffffffffffff) sendto$inet(r3, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) recvmmsg(r3, &(0x7f0000002940)=[{{&(0x7f00000011c0)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000001280)=""/112, 0x70}}, {{0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f00000028c0)=""/87, 0xffffffffffffff4f}}], 0x45483d5a560d7693, 0x0, &(0x7f0000002a80)={0x0, r4+30000000}) close(r0) fcntl$notify(r0, 0x402, 0x8) 09:06:43 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:43 executing program 2: syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000600)) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) epoll_create(0x0) r2 = socket$inet6(0xa, 0x2000000000000001, 0x8014000000000084) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000180)=0x8000, 0x8) bind$inet6(r2, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r2, 0x2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}}}, 0xa, 0x0, 0x0, 0x0, 0xd}, 0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0x9, @empty, 0x4}}}, &(0x7f0000000a00)=0x84) [ 190.406373] audit: type=1804 audit(1545642403.592:33): pid=7702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/9/memory.events" dev="sda1" ino=16518 res=1 [ 190.435460] audit: type=1800 audit(1545642403.622:34): pid=7702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16518 res=0 09:06:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30}, 0x30) 09:06:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:43 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0a5c2d023c126285718070") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) [ 190.531305] audit: type=1804 audit(1545642403.712:35): pid=7710 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/9/memory.events" dev="sda1" ino=16518 res=1 09:06:43 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:43 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) unshare(0x600) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001080)={r0, 0x0, 0x0}, 0x20) [ 190.602654] audit: type=1800 audit(1545642403.722:36): pid=7710 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16518 res=0 09:06:43 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:43 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x80', 0x0) fcntl$setlease(r0, 0x400, 0x0) 09:06:43 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:44 executing program 4: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x5, 0x0, [0x20000700, 0x0, 0x0, 0x20000880, 0x20000af0], 0x0, &(0x7f0000000440)}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:44 executing program 3: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(r5, &(0x7f0000000b00)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x5, 0x138, [0x20000700, 0x0, 0x0, 0x20000880, 0x20000af0], 0x0, &(0x7f0000000440), &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x1b0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:44 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x0, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:44 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, 0x0, &(0x7f00000000c0)=""/62}, 0x18) 09:06:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x0, 0x0, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:44 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) [ 191.654039] audit: type=1804 audit(1545642404.832:37): pid=7756 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/10/memory.events" dev="sda1" ino=16546 res=1 09:06:45 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) [ 191.800971] audit: type=1800 audit(1545642404.872:38): pid=7756 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16546 res=0 [ 191.883146] syz-executor1 (7764) used greatest stack depth: 12776 bytes left 09:06:45 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) [ 192.168865] audit: type=1804 audit(1545642405.352:39): pid=7769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir836518150/syzkaller.djo0nC/6/memory.events" dev="sda1" ino=16518 res=1 [ 192.291149] audit: type=1800 audit(1545642405.352:40): pid=7769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor3" name="memory.events" dev="sda1" ino=16518 res=0 [ 192.339041] syz-executor4 (7766) used greatest stack depth: 11800 bytes left 09:06:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, 0x0, &(0x7f00000000c0)=""/62}, 0x18) 09:06:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, 0x0, 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:45 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:45 executing program 4: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000d80)=@nat={'nat\x00', 0x19, 0x5, 0x0, [0x20000700, 0x0, 0x0, 0x20000880, 0x20000af0], 0x0, &(0x7f0000000440)}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 192.481771] syz-executor3 (7759) used greatest stack depth: 11784 bytes left 09:06:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x0, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000001180), 0x4) 09:06:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0xc, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 09:06:45 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 09:06:45 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:46 executing program 2: r0 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f00000000c0)={'bond_slave_0\x00', @ifru_flags=0x1}) 09:06:46 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:46 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b7020000fe000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x94, 0x0, &(0x7f0000000380)="61c043ddc9bc7819a65b6fe032bc825ebff2cf047a44891fa66a43a65b0b0e5e69f4f41dbb8ac4003cdfd4615251c2b3bc0f72f03f11effec4f99a984b03a958423a3e379b2fc0e5aeeadbf70b272d378a15a65ce36c2695ae51af4f941284132faad414e3310235794482d8a37497e3985db51b33dd3af6cc612853c52c455b767305111b31f33d8a2c653f28349b94ece1fd5d", 0x0, 0x7}, 0x28) 09:06:46 executing program 2: times(0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) r1 = memfd_create(&(0x7f0000000080)='bond_slave_0\x00', 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, r1, 0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'bond_slave_0\x00'}, 0x18) 09:06:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x81, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000040), 0x0}, 0x20) 09:06:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 09:06:46 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000180)) 09:06:46 executing program 5: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:46 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) [ 193.337244] IPVS: stopping master sync thread 7891 ... [ 193.342886] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 09:06:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000580)='net/raw\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0xe0) 09:06:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) [ 193.389085] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 193.389862] IPVS: stopping master sync thread 7896 ... 09:06:47 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) 09:06:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:47 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xffffff46) fcntl$addseals(r0, 0x409, 0x0) 09:06:47 executing program 4: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x2) socket$inet6(0xa, 0x0, 0x1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) clone(0x210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="db000000000000e97ee2005d0047f60adac028e03c1c5d340af7d28fd700ff000000000000000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 09:06:47 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 09:06:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea74}, 0x28) 09:06:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xea74}, 0x28) 09:06:47 executing program 4: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4004700e, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) read(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) 09:06:47 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, 0x0) waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:47 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000000)={'bond0\x00', 0x2000000000000ff7}) [ 194.209205] ÷: renamed from bond0 09:06:48 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:48 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, 0x0) waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x7, 0x0, &(0x7f00000000c0)="e4600192340608", 0x0, 0xea74}, 0x28) 09:06:48 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000000)={'bond0\x00', 0x2000000000000ff7}) 09:06:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 09:06:48 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 194.865516] kauditd_printk_skb: 8 callbacks suppressed [ 194.865530] audit: type=1800 audit(1545642408.052:49): pid=7941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16522 res=0 [ 194.936267] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:06:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xb, 0x0, &(0x7f00000000c0)="e46001923406080000000a", 0x0, 0xea74}, 0x28) 09:06:48 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, 0x0) waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:48 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)) waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:48 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000000)={'bond0\x00', 0x2000000000000ff7}) 09:06:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xd, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05", 0x0, 0xea74}, 0x28) 09:06:48 executing program 4: r0 = socket(0x1, 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0xc0045c79) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) close(r0) 09:06:49 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:49 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)) waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:49 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8923, &(0x7f0000000000)={'bond0\x00', 0x2000000000000ff7}) 09:06:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0}, 0x28) 09:06:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x34910}], 0x1) 09:06:49 executing program 3: ftruncate(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) [ 195.871227] audit: type=1800 audit(1545642409.052:50): pid=7997 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16586 res=0 09:06:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0}, 0x28) 09:06:49 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)) waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x27, 0x0, 0x0, 0x0, 0x6c}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 09:06:49 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x4000003) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x3) 09:06:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0}, 0x28) 09:06:49 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12") waitid(0x2, 0x0, 0x0, 0x9, 0x0) [ 196.236371] audit: type=1804 audit(1545642409.422:51): pid=8063 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir586567017/syzkaller.glurUq/19/bus" dev="sda1" ino=16586 res=1 09:06:50 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lremovexattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=@random={'os2.', '\x00'}) 09:06:50 executing program 3: ftruncate(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:50 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0x82) [ 196.843778] audit: type=1800 audit(1545642410.032:52): pid=8050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16601 res=0 09:06:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 197.029969] audit: type=1804 audit(1545642410.212:53): pid=8068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir586567017/syzkaller.glurUq/19/bus" dev="sda1" ino=16586 res=1 09:06:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:06:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12628571") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:50 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000000000500e, 0x0) 09:06:50 executing program 3: ftruncate(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:50 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12628571") waitid(0x2, 0x0, 0x0, 0x9, 0x0) [ 197.465390] audit: type=1804 audit(1545642410.652:54): pid=8094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir586567017/syzkaller.glurUq/19/bus" dev="sda1" ino=16586 res=1 09:06:51 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c12628571") waitid(0x2, 0x0, 0x0, 0x9, 0x0) [ 197.837438] audit: type=1800 audit(1545642411.022:55): pid=8088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16616 res=0 09:06:51 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)="01", 0x1}], 0x1}, 0x7ff8) 09:06:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:06:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000680)=0xfff, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) dup2(r0, r0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1ffc}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x400100) 09:06:51 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:51 executing program 3: ftruncate(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:51 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262857180") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:51 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262857180") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:06:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x8, 0x209e20, 0x8000000001}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0xca) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 09:06:51 executing program 0: close(0xffffffffffffffff) 09:06:51 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c1262857180") waitid(0x2, 0x0, 0x0, 0x9, 0x0) 09:06:51 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:06:51 executing program 3: ftruncate(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x8, 0x209e20, 0x8000000001}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0xca) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 09:06:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1\x00'}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="000002000a000200aa98aaaa8c85c6c6"], 0x1}}, 0x0) 09:06:52 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) dup3(r0, 0xffffffffffffff9c, 0x80002) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:52 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x0, 0x0, 0x0, 0x9, 0x0) 09:06:52 executing program 3: ftruncate(0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:06:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x80000000003, 0x81, 0x20000000000001, 0x8, 0x0}, 0x2c) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 09:06:52 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bond0\x00', 0x2000000000000ff7}) [ 198.866557] audit: type=1804 audit(1545642412.052:56): pid=8140 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/17/memory.events" dev="sda1" ino=16622 res=1 [ 198.891467] audit: type=1800 audit(1545642412.052:57): pid=8140 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16622 res=0 09:06:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 09:06:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:06:52 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x0, 0x0, 0x0, 0x9, 0x0) 09:06:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) flistxattr(r1, 0x0, 0x0) 09:06:52 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x0, 0x0, 0x0, 0x9, 0x0) 09:06:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 199.498605] audit: type=1804 audit(1545642412.682:58): pid=8190 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/18/memory.events" dev="sda1" ino=16640 res=1 09:06:52 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) dup3(r0, 0xffffffffffffff9c, 0x80002) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:52 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x0, 0x0) 09:06:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00000017c0)='syzkal\x854\xed\x0f', 0x1, 0xb7, &(0x7f0000000180)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1040000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000300)={r0, r1}) write$binfmt_elf32(r2, &(0x7f0000000140)=ANY=[], 0xff3e) recvmmsg(r2, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000002, 0x0) 09:06:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 09:06:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x5f937043) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x4800) [ 199.682601] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 09:06:53 executing program 2: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:06:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:53 executing program 0: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x1) fcntl$setstatus(r0, 0x4, 0x44003) io_setup(0x3f, &(0x7f0000000100)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 09:06:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x0, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:53 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x0, 0x0) 09:06:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x0, 0x0, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) [ 200.265308] XFS (loop2): Invalid superblock magic number [ 200.360337] kauditd_printk_skb: 1 callbacks suppressed [ 200.360352] audit: type=1804 audit(1545642413.542:60): pid=8240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/19/memory.events" dev="sda1" ino=16641 res=1 09:06:53 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) dup3(r0, 0xffffffffffffff9c, 0x80002) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) [ 200.472720] audit: type=1800 audit(1545642413.542:61): pid=8240 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16641 res=0 09:06:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, 0x0, 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:53 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) close(r0) 09:06:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x0, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) [ 200.759670] audit: type=1804 audit(1545642413.942:62): pid=8290 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/20/memory.events" dev="sda1" ino=16642 res=1 [ 200.804726] audit: type=1800 audit(1545642413.942:63): pid=8290 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16642 res=0 09:06:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1}, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x80000) 09:06:54 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") waitid(0x2, 0x0, 0x0, 0x0, 0x0) 09:06:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040), 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x80, 0x5) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) close(r2) r3 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000440)=[{&(0x7f0000000480)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc7f) fcntl$setstatus(r1, 0x4, 0x3) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r3, r4, 0x0, 0x80003) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) r8 = syz_open_procfs(r7, &(0x7f0000000380)='environ\x00') ioctl$sock_SIOCGIFBR(r8, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000180)=""/36, 0xd8}) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') io_setup(0x7c, &(0x7f0000000340)) 09:06:54 executing program 0: 09:06:54 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:54 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, 0x0, &(0x7f0000005c00)=""/156, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000840)=""/236, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) 09:06:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 09:06:54 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000007cc0)=[{{&(0x7f0000000340)=@in={0x2, 0x4e24, @remote}, 0x80, 0x0, 0x0, &(0x7f0000001980)=[{0xc}], 0xc}}], 0x1, 0x0) [ 201.024360] audit: type=1804 audit(1545642414.212:64): pid=8310 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/21/memory.events" dev="sda1" ino=16638 res=1 [ 201.091266] audit: type=1800 audit(1545642414.242:65): pid=8310 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16638 res=0 09:06:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r0 = shmget(0x3, 0x4000, 0x78000200, &(0x7f0000ffa000/0x4000)=nil) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0) semget(0xffffffffffffffff, 0x0, 0x0) shmctl$IPC_RMID(r0, 0x0) 09:06:54 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0, 0xea74}, 0x28) 09:06:54 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001f00)) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1}, 0xc) creat(&(0x7f00000000c0)='./file0\x00', 0x42) [ 201.281374] audit: type=1804 audit(1545642414.472:66): pid=8334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir878258216/syzkaller.QKi6ka/23/file0" dev="sda1" ino=16657 res=1 [ 201.366245] audit: type=1804 audit(1545642414.532:67): pid=8332 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/22/memory.events" dev="sda1" ino=16658 res=1 [ 201.475496] audit: type=1800 audit(1545642414.532:68): pid=8332 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16658 res=0 [ 201.652104] device bridge_slave_1 left promiscuous mode [ 201.658381] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.716969] device bridge_slave_0 left promiscuous mode [ 201.722923] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.823240] team0 (unregistering): Port device team_slave_1 removed [ 201.834944] team0 (unregistering): Port device team_slave_0 removed [ 201.846341] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 201.894568] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 201.959337] bond0 (unregistering): Released all slaves [ 202.809905] IPVS: ftp: loaded support on port[0] = 21 [ 203.266353] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.272879] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.279742] device bridge_slave_0 entered promiscuous mode [ 203.305448] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.311956] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.318887] device bridge_slave_1 entered promiscuous mode [ 203.343989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 203.369168] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 203.441746] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 203.469290] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 203.579301] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 203.586526] team0: Port device team_slave_0 added [ 203.609655] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 203.617001] team0: Port device team_slave_1 added [ 203.643372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.671077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.698566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.726005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.963288] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.969634] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.976300] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.982676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.857312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.940443] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 205.021753] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 205.027852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.036175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.116697] 8021q: adding VLAN 0 to HW filter on device team0 09:06:58 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040), 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x80, 0x5) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) close(r2) r3 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000440)=[{&(0x7f0000000480)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc7f) fcntl$setstatus(r1, 0x4, 0x3) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0x526987c9) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r3, r4, 0x0, 0x80003) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) r8 = syz_open_procfs(r7, &(0x7f0000000380)='environ\x00') ioctl$sock_SIOCGIFBR(r8, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000180)=""/36, 0xd8}) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') io_setup(0x7c, &(0x7f0000000340)) 09:06:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea74}, 0x28) 09:06:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r0 = shmget(0x3, 0x4000, 0x78000200, &(0x7f0000ffa000/0x4000)=nil) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0) semget(0xffffffffffffffff, 0x0, 0x0) shmctl$IPC_RMID(r0, 0x0) 09:06:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) r0 = shmget(0x3, 0x4000, 0x78000200, &(0x7f0000ffa000/0x4000)=nil) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), 0x0) semget(0xffffffffffffffff, 0x0, 0x0) shmctl$IPC_RMID(r0, 0x0) 09:06:58 executing program 4: 09:06:58 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:58 executing program 4: 09:06:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xea74}, 0x28) [ 205.733665] audit: type=1804 audit(1545642418.912:69): pid=8612 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/23/memory.events" dev="sda1" ino=16678 res=1 09:06:58 executing program 0: 09:06:59 executing program 4: [ 205.841438] audit: type=1800 audit(1545642418.962:70): pid=8612 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16678 res=0 09:06:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x7, 0x0, &(0x7f00000000c0)="e4600192340608", 0x0, 0xea74}, 0x28) 09:06:59 executing program 0: 09:06:59 executing program 2: 09:06:59 executing program 4: 09:06:59 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:06:59 executing program 5: 09:06:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xb, 0x0, &(0x7f00000000c0)="e46001923406080000000a", 0x0, 0xea74}, 0x28) 09:06:59 executing program 0: 09:06:59 executing program 5: 09:06:59 executing program 0: 09:06:59 executing program 4: 09:06:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xd, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05", 0x0, 0xea74}, 0x28) 09:06:59 executing program 5: 09:06:59 executing program 0: 09:06:59 executing program 2: 09:06:59 executing program 4: [ 207.046977] audit: type=1804 audit(1545642420.232:71): pid=8650 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/24/memory.events" dev="sda1" ino=16662 res=1 [ 207.071722] audit: type=1800 audit(1545642420.232:72): pid=8650 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16662 res=0 09:07:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0}, 0x28) 09:07:00 executing program 0: 09:07:00 executing program 2: 09:07:00 executing program 4: timer_create(0xfffffffffffffffc, 0x0, &(0x7f00000005c0)) timer_settime(0x0, 0x0, 0x0, 0x0) 09:07:00 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:00 executing program 5: 09:07:00 executing program 2: 09:07:00 executing program 0: 09:07:00 executing program 4: 09:07:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0}, 0x28) 09:07:00 executing program 5: 09:07:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e46001923406080000000a9b05dd", 0x0}, 0x28) 09:07:00 executing program 4: 09:07:00 executing program 2: 09:07:00 executing program 0: 09:07:00 executing program 5: 09:07:01 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:01 executing program 0: 09:07:01 executing program 4: 09:07:01 executing program 5: 09:07:01 executing program 3: 09:07:01 executing program 2: [ 208.222390] audit: type=1800 audit(1545642421.412:73): pid=8708 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16684 res=0 09:07:01 executing program 3: 09:07:01 executing program 2: 09:07:01 executing program 4: 09:07:01 executing program 0: 09:07:01 executing program 5: 09:07:01 executing program 3: 09:07:02 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:02 executing program 4: 09:07:02 executing program 2: 09:07:02 executing program 0: 09:07:02 executing program 5: 09:07:02 executing program 3: [ 209.264761] audit: type=1804 audit(1545642422.452:74): pid=8735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/26/memory.events" dev="sda1" ino=16518 res=1 [ 209.289281] audit: type=1800 audit(1545642422.452:75): pid=8735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16518 res=0 09:07:02 executing program 4: 09:07:02 executing program 0: 09:07:02 executing program 3: 09:07:02 executing program 2: 09:07:02 executing program 5: 09:07:02 executing program 0: [ 209.456086] audit: type=1804 audit(1545642422.642:76): pid=8753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/27/memory.events" dev="sda1" ino=16718 res=1 [ 209.532692] audit: type=1800 audit(1545642422.642:77): pid=8753 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16718 res=0 09:07:02 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:02 executing program 4: 09:07:02 executing program 3: 09:07:02 executing program 5: 09:07:02 executing program 2: 09:07:02 executing program 0: 09:07:02 executing program 2: 09:07:02 executing program 4: 09:07:02 executing program 0: 09:07:02 executing program 3: 09:07:03 executing program 5: 09:07:03 executing program 2: [ 209.847192] audit: type=1804 audit(1545642423.032:78): pid=8777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/28/memory.events" dev="sda1" ino=16701 res=1 09:07:03 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:03 executing program 3: 09:07:03 executing program 0: 09:07:03 executing program 4: 09:07:03 executing program 2: 09:07:03 executing program 3: 09:07:03 executing program 0: 09:07:03 executing program 5: 09:07:03 executing program 4: 09:07:03 executing program 5: 09:07:03 executing program 0: 09:07:03 executing program 3: 09:07:03 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:03 executing program 2: 09:07:03 executing program 5: 09:07:03 executing program 2: 09:07:03 executing program 4: 09:07:03 executing program 0: 09:07:03 executing program 3: 09:07:03 executing program 3: 09:07:03 executing program 2: 09:07:03 executing program 4: 09:07:03 executing program 0: 09:07:03 executing program 5: [ 210.909776] kauditd_printk_skb: 3 callbacks suppressed [ 210.909792] audit: type=1804 audit(1545642424.092:82): pid=8829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/30/memory.events" dev="sda1" ino=16730 res=1 [ 210.939830] audit: type=1800 audit(1545642424.092:83): pid=8829 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16730 res=0 09:07:04 executing program 4: 09:07:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$cont(0x20, r1, 0x0, 0x0) 09:07:04 executing program 3: 09:07:04 executing program 5: 09:07:04 executing program 0: 09:07:04 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:04 executing program 4: 09:07:04 executing program 0: 09:07:04 executing program 2: 09:07:04 executing program 5: 09:07:04 executing program 3: 09:07:04 executing program 4: 09:07:04 executing program 2: 09:07:04 executing program 3: 09:07:04 executing program 0: 09:07:04 executing program 5: 09:07:04 executing program 2: [ 211.642563] audit: type=1804 audit(1545642424.832:84): pid=8871 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/31/memory.events" dev="sda1" ino=16717 res=1 [ 211.667295] audit: type=1800 audit(1545642424.832:85): pid=8871 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16717 res=0 09:07:04 executing program 0: 09:07:04 executing program 3: 09:07:04 executing program 4: 09:07:05 executing program 2: 09:07:05 executing program 5: 09:07:05 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:05 executing program 3: 09:07:05 executing program 4: 09:07:05 executing program 0: 09:07:05 executing program 5: 09:07:05 executing program 2: 09:07:05 executing program 3: 09:07:05 executing program 4: 09:07:05 executing program 2: 09:07:05 executing program 0: 09:07:05 executing program 5: 09:07:05 executing program 3: [ 212.236273] audit: type=1804 audit(1545642425.422:86): pid=8914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/32/memory.events" dev="sda1" ino=16752 res=1 [ 212.280545] audit: type=1800 audit(1545642425.462:87): pid=8914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16752 res=0 09:07:05 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:05 executing program 2: 09:07:05 executing program 4: 09:07:05 executing program 3: 09:07:05 executing program 0: 09:07:05 executing program 5: 09:07:05 executing program 5: 09:07:05 executing program 4: 09:07:05 executing program 0: 09:07:05 executing program 2: 09:07:05 executing program 3: 09:07:05 executing program 0: 09:07:05 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:05 executing program 4: 09:07:05 executing program 5: 09:07:05 executing program 3: 09:07:05 executing program 2: 09:07:05 executing program 3: 09:07:05 executing program 4: 09:07:05 executing program 2: 09:07:05 executing program 5: 09:07:05 executing program 0: 09:07:06 executing program 3: 09:07:06 executing program 4: [ 213.190722] audit: type=1804 audit(1545642426.372:88): pid=8958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/34/memory.events" dev="sda1" ino=16746 res=1 [ 213.215991] audit: type=1800 audit(1545642426.382:89): pid=8958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16746 res=0 09:07:06 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:06 executing program 5: 09:07:06 executing program 2: 09:07:06 executing program 0: 09:07:06 executing program 3: 09:07:06 executing program 4: 09:07:06 executing program 4: 09:07:06 executing program 3: 09:07:06 executing program 0: 09:07:06 executing program 5: 09:07:06 executing program 2: 09:07:06 executing program 0: [ 213.880252] audit: type=1804 audit(1545642427.062:90): pid=8987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/35/memory.events" dev="sda1" ino=16517 res=1 [ 213.905748] audit: type=1800 audit(1545642427.072:91): pid=8987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16517 res=0 09:07:07 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:07 executing program 0: 09:07:07 executing program 4: 09:07:07 executing program 5: 09:07:07 executing program 2: 09:07:07 executing program 3: 09:07:07 executing program 3: 09:07:07 executing program 4: 09:07:07 executing program 0: 09:07:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x22) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x8000000000002a7, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, 0x0) 09:07:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='em0\'wlan0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) dup3(r1, r0, 0x0) 09:07:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000c80)=[{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000180)="776c673ad748aa044aa781a4651eb4d2fa", 0x11}], 0x1}], 0x1, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x34b01}], 0x1) 09:07:08 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:08 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') prctl$PR_GET_TID_ADDRESS(0x28, 0x0) close(r0) prctl$PR_SET_ENDIAN(0x14, 0x0) eventfd2(0x0, 0x0) syncfs(0xffffffffffffffff) getgid() fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000200)="8b94422328fbf3ec", 0x8) 09:07:08 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x9c}) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 09:07:08 executing program 5: unshare(0x400) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000340)='./bus\x00', 0x141046, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x6d4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 09:07:08 executing program 3: pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f00000001c0), 0xfffffef3) readv(r0, &(0x7f00000025c0)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1) 09:07:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x22) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x8000000000002a7, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, 0x0) 09:07:08 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) poll(0x0, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000008c0)={'\x00', 0x2}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000a00)) 09:07:08 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x9) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, 0x0}, 0x0) 09:07:08 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000140)="e7", 0x1}], 0x1) 09:07:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='4'], 0x1) 09:07:08 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) 09:07:08 executing program 5: 09:07:08 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:08 executing program 0: 09:07:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x22) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x8000000000002a7, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, 0x0) 09:07:08 executing program 5: 09:07:09 executing program 3: clone(0x402102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r::s0\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00w?\xc4\xd8(\xc7zn56\x03\x13\x18n\xf6\x9d\xf0:\xed\x1a\xd5\xaa+\x96\x98\xa2c\x02\x1a\x0e\xd8\xd6\x97\xa7\xd2\x13\x82\ta\xc6\xe4\x82\xfc\x18P6RW\xcc\x1f\x0f\xa2\xbd\x01N\x05\xce\x82#\x0ez\x11\xa8\xb5\v\x99\\\xdd;\xd0\xa2\xea\x19\xed{B X\x82`m\xb1\x1e\x85\x13\xb7E\xc2\xe0s\xf0\x06\xbckdPq\xe7\xb7\x13]%F\xce\xc8gM\x0e->\xeb\x11T\xd1\xe9\x9e\xa8T\xb2\x00\xf6\x06\x1e\xf6q\x16zR&\xfc\xcc', 0xa8, 0x0) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) syz_open_procfs(r0, &(0x7f0000000180)='net/ip_mr_vif\x00') 09:07:09 executing program 4: 09:07:09 executing program 5: 09:07:09 executing program 0: 09:07:09 executing program 5: r0 = open(&(0x7f0000000040)='.\x00', 0x143042, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERROR(r0, 0x0, 0x0) 09:07:09 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="6000000090780000"], 0x0) 09:07:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des3_ede)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="de75e1fe7d087634b214a3765ba0017995103a08917fc2a1", 0x18) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000240)="414187336534d609e8", 0x9}], 0x1}, 0x0) 09:07:09 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x80000000003, 0x81, 0x20000000000001, 0x8, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, 0x0}, 0x10) [ 216.461510] kauditd_printk_skb: 3 callbacks suppressed [ 216.461527] audit: type=1804 audit(1545642429.642:95): pid=9104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/38/memory.events" dev="sda1" ino=16701 res=1 [ 216.491309] audit: type=1800 audit(1545642429.652:96): pid=9104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16701 res=0 09:07:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) 09:07:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)=0x0) getpgid(r1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) 09:07:09 executing program 5: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000180)=0x4) 09:07:09 executing program 2: setuid(0xee01) r0 = semget(0x0, 0x0, 0x0) semctl$SETVAL(r0, 0x0, 0x8, 0x0) 09:07:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) pipe(0x0) 09:07:09 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:09 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet(0x2, 0xa, 0x8) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x213}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 216.678362] EXT4-fs (sda1): resizing filesystem from 524032 to 4 blocks [ 216.711259] EXT4-fs warning (device sda1): ext4_resize_fs:1930: can't shrink FS - resize aborted 09:07:09 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') unlink(&(0x7f0000000100)='./file1/file0\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000000)='./file1\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgr\xd7\xc4\xe1\xbcsyz1\x00', 0x200002, 0x0) [ 216.797458] syz-executor2 uses obsolete (PF_INET,SOCK_PACKET) 09:07:10 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2ec) clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ptrace(0x10, r0) ptrace$getsig(0x2, r0, 0xffffffffff600003, &(0x7f0000000000)) 09:07:10 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000600)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) r1 = socket$inet6(0xa, 0x2000000000000001, 0x8014000000000084) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000180)=0x8000, 0x8) bind$inet6(r1, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r1, 0x2) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}}}, 0xa, 0x0, 0x0, 0x0, 0xd}, 0x98) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0x9, @empty, 0x4}}}, &(0x7f0000000a00)=0x84) 09:07:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x5f937043) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x2200) 09:07:10 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0xf, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) epoll_create(0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8014000000000084) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000180), 0x8) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}}}, 0xa, 0x0, 0x0, 0x0, 0xd}, 0x98) 09:07:10 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r0, &(0x7f0000000100), 0x22c, 0x0) 09:07:10 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0xf, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2000) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8014000000000084) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000180), 0x8) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev={0xac, 0x14, 0x2a4}}}, 0xa, 0x0, 0x0, 0x0, 0xd}, 0x98) 09:07:10 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r0, &(0x7f0000000100), 0x22c, 0x0) 09:07:10 executing program 0: [ 217.356124] audit: type=1804 audit(1545642430.542:97): pid=9153 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/39/memory.events" dev="sda1" ino=16809 res=1 09:07:10 executing program 0: [ 217.421103] audit: type=1800 audit(1545642430.542:98): pid=9153 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16809 res=0 09:07:10 executing program 3: 09:07:10 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:11 executing program 4: [ 217.910496] audit: type=1804 audit(1545642431.092:99): pid=9208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/40/memory.events" dev="sda1" ino=16518 res=1 [ 217.958888] audit: type=1800 audit(1545642431.092:100): pid=9208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16518 res=0 09:07:13 executing program 3: 09:07:13 executing program 0: 09:07:13 executing program 4: 09:07:13 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:13 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2ec) clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ptrace(0x10, r0) ptrace$getsig(0x2, r0, 0xffffffffff600003, &(0x7f0000000000)) 09:07:13 executing program 2: 09:07:13 executing program 0: 09:07:13 executing program 2: 09:07:13 executing program 4: 09:07:13 executing program 3: 09:07:13 executing program 0: pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x1003, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000587000)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f000096f000)="06000700000000000f", 0x9}]) 09:07:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x100, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x9, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00637000800000a1153fedfcfb49865596bebcc99999d8b4b1a9d70c937f475bf63954babce14bf9abb2e5055f636cec1bbb7d205c2ceb75b6cba1f8ef6ae3c4bdfeb0b813f1f93ce7401ce6c98e46aee60b61cb2178f878491c4d462e2d2fe7ba736d08c6df3c24b5394c5728d23824a157d4a48466660fde95e98d9ddd598070da3985a8d0334bc4ec75588548b156399baab32de2d20828cc86cf45f5b48f411c23568513c818bf4430440b445af440c20f048244437889b093295d3dc5d88666d393e6fab360cf02dccbc028e00bb4af"], 0xd2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r2, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffffffffffe}, 0x10) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cgroup.max.depth\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x100000020000000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) setsockopt$sock_attach_bpf(r3, 0x29, 0x6, 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x20000000001) 09:07:13 executing program 2: r0 = memfd_create(&(0x7f0000000640)='\x00\x00\x00\x00\x00\x00r%\xf7\x83\x80\x80}\xdePS`\x18A\xa0\xd0\xf8+t7HR\xb0\x1f\x12Y\x97b-\xc4\xa5\xe7\x1d,\xe5\xac2\xff\x90\x82O\xa2^Y\a4\x87\xcf6\xadWn2\x92k\x04\x89M\xa7@\xf7\xe9\xc0\xff\xb4,5j\x1f([\xfc\x8f\v\x8cor\xef\x15\x1d\xabL\\*Zu\x1f\x04\xbf\xc6\x9a\xc5\xc3\xb5\x16\x8am\x13\xd8&\xb1\xed\fu\'\xd5\x8fT\xad\xc1/\xca\x1f%\xc8\xfc%\x86\xeaM\x90\xf8M\xab\xcd\xec)\x1f\xb7\x80\xa3\x9a\x11}\x12\xb0\x89;\x18 \x98\xdc\xee\xd3;\"*\x1dA7\t\xae5]M)\x7f\xe4,]N\x9d\x8b\xbd\x9d\fp\x9c\xaeG\xe8\x8f\x8a\xa2*P[>\x99[P\x1f\r7S\xcd5\x10\xe8t6a+@\x13\x05\xf3\x16\x17\x7fmMLp\xfd\x9d&!\xc3pz\xd8\x8d\xa7\x85%\x96\xd8\x9aY\xcbtP^gZ\xc6\xeb\xc0?\xaa>\xe9\x98\x89\x17kW\x115\x03\x1a\xfc\x97\xce\xc4]\"\xfdhy(A\x1b\x83\xf6\x8b\xf7\xbeK!\xfd\xf0\x03<\xf9I\xb8\xa7j\xa6]h\xad\x88Yg\xc2\xcc<-`\xect\xfc\xf5\xde\x16,\x94\xff\xe3\xe1Wu\xc1\xa1\xcf\xd9\x81\x8dL\x17\xa2\xf8\xd0\xa70%8\xf0y\xe7\xb1(\xef\x12<\x8b\xb9\t\x00\x00\x00\x00\x00\x00\x008\x14\xc2\xae\xa8l5\xfb\xf4$Jdc]2\xff\x12\xe4\xdc\xb3\xdfV\xe5\xd5\xd3\x88*\x99\x84\x99?\x8a\x7f\xefr\xd8u\xd2\x1c\x1e;\xb2\xbc>ny\xa2\xb6\xd3\"\xf7\x10\xf07\x8a\xbc \x95\xd3!9\xe3\x9f2#\xdb\x99a0\x92\x95\xe4\xc3\xc8\xe1\xb0\x00\x1d\xd7W\xaa\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\xec\xa8\f{\f', 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 09:07:13 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_emit_ethernet(0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaa550000000000000008060008ff0f06040000000000000000ac1414aaffffffffffffac1414aa2cd356097f18e10708b33dcd07de474b765ea73d08052f0d5a6c6fbc9d7c1d4301223fc46d1b94fc7f4eb9c91a298bec6a9a1f4933912fd6c98ed577e80e33bc48"], 0x0) 09:07:13 executing program 3: setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x44, 0x9}}}}}, &(0x7f0000000040)) [ 220.558899] audit: type=1804 audit(1545642433.742:101): pid=9238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/41/memory.events" dev="sda1" ino=16826 res=1 [ 220.586582] audit: type=1800 audit(1545642433.772:102): pid=9238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16826 res=0 09:07:13 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) 09:07:14 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2ec) clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ptrace(0x10, r0) ptrace$getsig(0x2, r0, 0xffffffffff600003, &(0x7f0000000000)) 09:07:14 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 09:07:14 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 09:07:14 executing program 0: pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x1003, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000587000)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f000096f000)="06000700000000000f", 0x9}]) 09:07:14 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x100, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x867, 0x0, 0x9, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00637000800000a1153fedfcfb49865596bebcc99999d8b4b1a9d70c937f475bf63954babce14bf9abb2e5055f636cec1bbb7d205c2ceb75b6cba1f8ef6ae3c4bdfeb0b813f1f93ce7401ce6c98e46aee60b61cb2178f878491c4d462e2d2fe7ba736d08c6df3c24b5394c5728d23824a157d4a48466660fde95e98d9ddd598070da3985a8d0334bc4ec75588548b156399baab32de2d20828cc86cf45f5b48f411c23568513c818bf4430440b445af440c20f048244437889b093295d3dc5d88666d393e6fab360cf02dccbc028e00bb4af"], 0xd2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r2, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffffffffffe}, 0x10) r3 = socket$kcm(0xa, 0x1, 0x0) openat$cgroup_int(r2, &(0x7f0000000100)='cgroup.max.depth\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x100000020000000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) setsockopt$sock_attach_bpf(r3, 0x29, 0x6, 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x20000000001) 09:07:14 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ff2300020600010100000000000000e1fa"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x1000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0x0) 09:07:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)=""/4096, 0xf769}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) read(0xffffffffffffffff, 0x0, 0x0) 09:07:14 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 09:07:14 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 09:07:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, 0x0, 0x400001, 0x0) 09:07:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clock_gettime(0x2000000002, &(0x7f0000000080)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f00000002c0)={0x0, r2+30000000}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 221.219665] audit: type=1804 audit(1545642434.402:103): pid=9275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir411165824/syzkaller.bGAOc7/42/memory.events" dev="sda1" ino=16819 res=1 [ 221.297034] audit: type=1800 audit(1545642434.402:104): pid=9275 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16819 res=0 09:07:14 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @multicast2}, &(0x7f0000000380)=0x10) r0 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) r2 = dup3(r0, 0xffffffffffffff9c, 0x80002) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000400)={0x2}) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$KDSETLED(r2, 0x4b32, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) write(0xffffffffffffffff, 0x0, 0x0) [ 221.504693] syz-executor4 (9293) used greatest stack depth: 11432 bytes left 09:07:14 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2ec) clone(0x200000041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ptrace(0x10, r0) ptrace$getsig(0x2, r0, 0xffffffffff600003, &(0x7f0000000000)) 09:07:14 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 09:07:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffd}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000001000/0x18000)=nil, 0x0, 0xffffffffffffff98, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:07:14 executing program 3: 09:07:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) modify_ldt$read(0x0, 0x0, 0x0) 09:07:14 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000080)='./file1/file0\x00') rename(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000280)='./file1\x00') rename(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='./file0\x00') [ 221.722109] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 09:07:15 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) [ 221.880992] ================================================================== [ 221.888531] BUG: KASAN: slab-out-of-bounds in fpstate_init+0x50/0x160 [ 221.895122] Write of size 832 at addr ffff8881b3170bc0 by task syz-executor0/9345 [ 221.902765] [ 221.904440] CPU: 1 PID: 9345 Comm: syz-executor0 Not tainted 4.20.0-rc6-next-20181217+ #172 [ 221.912939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.922294] Call Trace: [ 221.924890] dump_stack+0x244/0x39d [ 221.928532] ? dump_stack_print_info.cold.1+0x20/0x20 [ 221.933748] ? printk+0xa7/0xcf [ 221.937055] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 221.941832] print_address_description.cold.4+0x9/0x1ff [ 221.947211] ? fpstate_init+0x50/0x160 [ 221.951121] kasan_report.cold.5+0x1b/0x39 [ 221.955366] ? fpstate_init+0x50/0x160 [ 221.959267] ? fpstate_init+0x50/0x160 [ 221.963175] check_memory_region+0x13e/0x1b0 [ 221.967598] memset+0x23/0x40 [ 221.970719] fpstate_init+0x50/0x160 [ 221.974454] kvm_arch_vcpu_init+0x3e9/0x870 [ 221.978793] kvm_vcpu_init+0x2fa/0x420 [ 221.982697] ? vcpu_stat_get+0x300/0x300 [ 221.986769] ? kmem_cache_alloc+0x33f/0x730 [ 221.991115] vmx_create_vcpu+0x1b7/0x2695 [ 221.995302] ? perf_trace_sched_process_exec+0x860/0x860 [ 222.000766] ? do_raw_spin_unlock+0xa7/0x330 [ 222.005211] ? vmx_exec_control+0x210/0x210 [ 222.009560] ? kasan_check_write+0x14/0x20 [ 222.013809] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 222.018766] ? futex_wait_queue_me+0x55d/0x840 [ 222.023361] ? wait_for_completion+0x8a0/0x8a0 [ 222.027960] ? print_usage_bug+0xc0/0xc0 [ 222.032040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.037587] ? get_futex_value_locked+0xcb/0xf0 [ 222.042272] kvm_arch_vcpu_create+0xe5/0x220 [ 222.046689] ? kvm_arch_vcpu_free+0x90/0x90 [ 222.051031] kvm_vm_ioctl+0x526/0x2030 [ 222.054930] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 222.060044] ? futex_wait+0x5ec/0xa50 [ 222.063872] ? kvm_unregister_device_ops+0x70/0x70 [ 222.068863] ? mark_held_locks+0x130/0x130 [ 222.073123] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 222.078324] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 222.083447] ? futex_wake+0x304/0x760 [ 222.087275] ? __lock_acquire+0x62f/0x4c20 [ 222.091538] ? mark_held_locks+0x130/0x130 [ 222.095779] ? graph_lock+0x270/0x270 [ 222.099589] ? do_futex+0x249/0x26d0 [ 222.103311] ? rcu_read_unlock_special+0x370/0x370 [ 222.108249] ? rcu_softirq_qs+0x20/0x20 [ 222.112247] ? unwind_dump+0x190/0x190 [ 222.116155] ? find_held_lock+0x36/0x1c0 [ 222.120238] ? __fget+0x4aa/0x740 [ 222.123725] ? lock_downgrade+0x900/0x900 [ 222.127883] ? check_preemption_disabled+0x48/0x280 [ 222.132910] ? kasan_check_read+0x11/0x20 [ 222.137065] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 222.142355] ? rcu_read_unlock_special+0x370/0x370 [ 222.147308] ? __fget+0x4d1/0x740 [ 222.150805] ? ksys_dup3+0x680/0x680 [ 222.154603] ? __might_fault+0x12b/0x1e0 [ 222.158695] ? lock_downgrade+0x900/0x900 [ 222.162853] ? lock_release+0xa00/0xa00 [ 222.166839] ? perf_trace_sched_process_exec+0x860/0x860 [ 222.172298] ? kvm_unregister_device_ops+0x70/0x70 [ 222.177242] do_vfs_ioctl+0x1de/0x1790 [ 222.181145] ? ioctl_preallocate+0x300/0x300 [ 222.185567] ? __fget_light+0x2e9/0x430 [ 222.189548] ? fget_raw+0x20/0x20 [ 222.193012] ? _copy_to_user+0xc8/0x110 [ 222.196999] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.202548] ? put_timespec64+0x10f/0x1b0 [ 222.206730] ? nsecs_to_jiffies+0x30/0x30 [ 222.210892] ? do_syscall_64+0x9a/0x820 [ 222.214878] ? do_syscall_64+0x9a/0x820 [ 222.218864] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 222.223466] ? security_file_ioctl+0x94/0xc0 [ 222.227922] ksys_ioctl+0xa9/0xd0 [ 222.231399] __x64_sys_ioctl+0x73/0xb0 [ 222.235309] do_syscall_64+0x1b9/0x820 [ 222.239212] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 222.244589] ? syscall_return_slowpath+0x5e0/0x5e0 [ 222.249528] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.254381] ? trace_hardirqs_on_caller+0x310/0x310 [ 222.259429] ? prepare_exit_to_usermode+0x291/0x3b0 [ 222.264461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.269322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.274518] RIP: 0033:0x457669 [ 222.277719] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.296627] RSP: 002b:00007fb490036c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 222.304340] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 222.311617] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000005 [ 222.318891] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 222.326215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4900376d4 [ 222.333525] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 222.340812] [ 222.342460] Allocated by task 9345: [ 222.346109] save_stack+0x43/0xd0 [ 222.349568] kasan_kmalloc+0xcb/0xd0 [ 222.353288] kasan_slab_alloc+0x12/0x20 [ 222.357269] kmem_cache_alloc+0x130/0x730 [ 222.361432] vmx_create_vcpu+0x110/0x2695 [ 222.365587] kvm_arch_vcpu_create+0xe5/0x220 [ 222.370002] kvm_vm_ioctl+0x526/0x2030 [ 222.373901] do_vfs_ioctl+0x1de/0x1790 [ 222.378301] ksys_ioctl+0xa9/0xd0 [ 222.381764] __x64_sys_ioctl+0x73/0xb0 [ 222.385659] do_syscall_64+0x1b9/0x820 [ 222.389555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.394745] [ 222.396388] Freed by task 0: [ 222.399453] (stack is not available) [ 222.403185] [ 222.404818] The buggy address belongs to the object at ffff8881b3170b80 [ 222.404818] which belongs to the cache x86_fpu of size 832 [ 222.417147] The buggy address is located 64 bytes inside of [ 222.417147] 832-byte region [ffff8881b3170b80, ffff8881b3170ec0) [ 222.428942] The buggy address belongs to the page: [ 222.433878] page:ffffea0006cc5c00 count:1 mapcount:0 mapping:ffff8881d7abc840 index:0x0 [ 222.442029] flags: 0x2fffc0000000200(slab) [ 222.446281] raw: 02fffc0000000200 ffff8881d509b648 ffff8881d509b648 ffff8881d7abc840 [ 222.454179] raw: 0000000000000000 ffff8881b3170040 0000000100000004 0000000000000000 [ 222.462074] page dumped because: kasan: bad access detected [ 222.467777] [ 222.469438] Memory state around the buggy address: [ 222.474371] ffff8881b3170d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 222.481763] ffff8881b3170e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 222.489130] >ffff8881b3170e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 222.496486] ^ [ 222.501942] ffff8881b3170f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 222.509306] ffff8881b3170f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 222.516660] ================================================================== [ 222.524018] Disabling lock debugging due to kernel taint [ 222.550209] Kernel panic - not syncing: panic_on_warn set ... [ 222.556139] CPU: 1 PID: 9345 Comm: syz-executor0 Tainted: G B 4.20.0-rc6-next-20181217+ #172 [ 222.566022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.575377] Call Trace: [ 222.577995] dump_stack+0x244/0x39d [ 222.578253] kobject: 'kvm' (0000000048c39ad7): kobject_uevent_env [ 222.581632] ? dump_stack_print_info.cold.1+0x20/0x20 [ 222.581668] ? fpstate_init+0x30/0x160 [ 222.581685] panic+0x2ad/0x632 [ 222.581705] ? add_taint.cold.5+0x16/0x16 [ 222.604338] ? preempt_schedule+0x4d/0x60 [ 222.608495] ? ___preempt_schedule+0x16/0x18 [ 222.609930] kobject: 'kvm' (0000000048c39ad7): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 222.612912] ? trace_hardirqs_on+0xb4/0x310 [ 222.612929] ? fpstate_init+0x50/0x160 [ 222.612945] end_report+0x47/0x4f [ 222.612963] kasan_report.cold.5+0xe/0x39 [ 222.637760] ? fpstate_init+0x50/0x160 [ 222.641651] ? fpstate_init+0x50/0x160 [ 222.645591] check_memory_region+0x13e/0x1b0 [ 222.650007] memset+0x23/0x40 [ 222.653154] fpstate_init+0x50/0x160 [ 222.656886] kvm_arch_vcpu_init+0x3e9/0x870 [ 222.661219] kvm_vcpu_init+0x2fa/0x420 [ 222.665148] ? vcpu_stat_get+0x300/0x300 [ 222.669284] ? kmem_cache_alloc+0x33f/0x730 [ 222.673624] vmx_create_vcpu+0x1b7/0x2695 [ 222.677787] ? perf_trace_sched_process_exec+0x860/0x860 [ 222.683287] ? do_raw_spin_unlock+0xa7/0x330 [ 222.687735] ? vmx_exec_control+0x210/0x210 [ 222.692127] ? kasan_check_write+0x14/0x20 [ 222.696399] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 222.701345] ? futex_wait_queue_me+0x55d/0x840 [ 222.705936] ? wait_for_completion+0x8a0/0x8a0 [ 222.710581] ? print_usage_bug+0xc0/0xc0 [ 222.714675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.720215] ? get_futex_value_locked+0xcb/0xf0 [ 222.724892] kvm_arch_vcpu_create+0xe5/0x220 [ 222.729312] ? kvm_arch_vcpu_free+0x90/0x90 [ 222.733663] kvm_vm_ioctl+0x526/0x2030 [ 222.737568] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 222.742680] ? futex_wait+0x5ec/0xa50 [ 222.746515] ? kvm_unregister_device_ops+0x70/0x70 [ 222.751477] ? mark_held_locks+0x130/0x130 [ 222.755723] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 222.760923] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 222.766026] ? futex_wake+0x304/0x760 [ 222.769841] ? __lock_acquire+0x62f/0x4c20 [ 222.774085] ? mark_held_locks+0x130/0x130 [ 222.778331] ? graph_lock+0x270/0x270 [ 222.782134] ? do_futex+0x249/0x26d0 [ 222.785876] ? rcu_read_unlock_special+0x370/0x370 [ 222.790818] ? rcu_softirq_qs+0x20/0x20 [ 222.794789] ? unwind_dump+0x190/0x190 [ 222.798681] ? find_held_lock+0x36/0x1c0 [ 222.802766] ? __fget+0x4aa/0x740 [ 222.806231] ? lock_downgrade+0x900/0x900 [ 222.810387] ? check_preemption_disabled+0x48/0x280 [ 222.815463] ? kasan_check_read+0x11/0x20 [ 222.819617] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 222.824906] ? rcu_read_unlock_special+0x370/0x370 [ 222.829864] ? __fget+0x4d1/0x740 [ 222.833328] ? ksys_dup3+0x680/0x680 [ 222.837078] ? __might_fault+0x12b/0x1e0 [ 222.841148] ? lock_downgrade+0x900/0x900 [ 222.845306] ? lock_release+0xa00/0xa00 [ 222.849285] ? perf_trace_sched_process_exec+0x860/0x860 [ 222.854744] ? kvm_unregister_device_ops+0x70/0x70 [ 222.859681] do_vfs_ioctl+0x1de/0x1790 [ 222.863576] ? ioctl_preallocate+0x300/0x300 [ 222.867992] ? __fget_light+0x2e9/0x430 [ 222.871981] ? fget_raw+0x20/0x20 [ 222.875448] ? _copy_to_user+0xc8/0x110 [ 222.879439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.885016] ? put_timespec64+0x10f/0x1b0 [ 222.889188] ? nsecs_to_jiffies+0x30/0x30 [ 222.893342] ? do_syscall_64+0x9a/0x820 [ 222.897320] ? do_syscall_64+0x9a/0x820 [ 222.901297] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 222.905883] ? security_file_ioctl+0x94/0xc0 [ 222.910293] ksys_ioctl+0xa9/0xd0 [ 222.913781] __x64_sys_ioctl+0x73/0xb0 [ 222.917678] do_syscall_64+0x1b9/0x820 [ 222.921571] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 222.926940] ? syscall_return_slowpath+0x5e0/0x5e0 [ 222.931878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.936729] ? trace_hardirqs_on_caller+0x310/0x310 [ 222.941754] ? prepare_exit_to_usermode+0x291/0x3b0 [ 222.946779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.951631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.956826] RIP: 0033:0x457669 [ 222.960028] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.978945] RSP: 002b:00007fb490036c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 222.986662] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 222.993934] RDX: 0000000000000000 RSI: 000000000000ae41 RDI: 0000000000000005 [ 223.001236] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 223.008521] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb4900376d4 [ 223.015793] R13: 00000000004c00ff R14: 00000000004d1170 R15: 00000000ffffffff [ 223.024080] Kernel Offset: disabled [ 223.027705] Rebooting in 86400 seconds..