1c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r3}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) [ 282.950119] protocol 88fb is buggy, dev hsr_slave_0 [ 282.955578] protocol 88fb is buggy, dev hsr_slave_1 03:20:19 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 283.067480] ptrace attach of "/root/syz-executor.5"[11003] was attempted by "/root/syz-executor.5"[11005] 03:20:19 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:19 executing program 2: preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0xfffffffffffffffd) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[]}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'team_slave_1\x00', 0x4fff}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba0009008d2633568e00000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) fcntl$setlease(r4, 0x400, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x3) accept4(r0, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) read(r6, &(0x7f0000000b80)=""/270, 0xb37af43) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) [ 283.176780] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.184745] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.241228] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 283.280166] protocol 88fb is buggy, dev hsr_slave_0 [ 283.285375] protocol 88fb is buggy, dev hsr_slave_1 03:20:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:20:20 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0xb4) connect$inet6(r2, &(0x7f0000000080), 0x1c) dup(0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) 03:20:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r3, 0x107, 0x13, &(0x7f0000651000)=""/240, &(0x7f0000000040)=0xf0) 03:20:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 283.330379] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:20:20 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x6, 0xe, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 283.390263] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 283.430113] protocol 88fb is buggy, dev hsr_slave_0 [ 283.435295] protocol 88fb is buggy, dev hsr_slave_1 03:20:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x800) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000600)=0x7fffffff, 0x4) bind$netlink(r0, &(0x7f0000000500)={0x10, 0x0, 0x25dfdbff, 0x2200000}, 0xc) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$notify(r0, 0x402, 0x1a) write(r2, &(0x7f0000000640)="05662605063c6fe4cecccc84e4432330513a104c0cd71508ecbe38b0f6ae54", 0x1f) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = syz_open_procfs(0x0, &(0x7f0000000580)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a\xc9n;v<\xd6h\xb0\x15\xaf;x\xb5;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK(\x0f\xadG\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff}) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r6, 0x7003) read$FUSE(r6, &(0x7f0000001100), 0x1000) 03:20:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x26) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@mss, @window, @sack_perm, @mss, @window, @window, @window], 0x7) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:20:20 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c0000000000ae47a825d86800278dcff47d01000000e100000000460234432479aed75d492b41fd5199615607672c59957ab35f4ad614fd33cebbc158bb2b03b5b2461179f5f90bba001b5080da6218a810", 0x58}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 283.460017] ptrace attach of "/root/syz-executor.5"[11030] was attempted by "/root/syz-executor.5"[11031] 03:20:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 283.570461] ptrace attach of "/root/syz-executor.5"[11041] was attempted by "/root/syz-executor.5"[11044] [ 283.604795] ptrace attach of "/root/syz-executor.3"[11045] was attempted by "/root/syz-executor.3"[11047] 03:20:22 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff008}, {0x6}]}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) 03:20:22 executing program 3: open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='omfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 03:20:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d1, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000880)=0x4, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x6c272b6b57da36ec) 03:20:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x40045564, &(0x7f0000000180)) 03:20:23 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x0, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000600), 0xfffffffffffffdae) r3 = socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, &(0x7f0000000000)=0x1, 0x4) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/238, 0xee}], 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f0000000140)=ANY=[], 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r3, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000180)) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x402) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0x323) syz_genetlink_get_family_id$tipc(0x0) creat(&(0x7f0000000380)='./bus\x00', 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000040)) r7 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000000c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) write$FUSE_POLL(r5, &(0x7f0000000540)={0xfffffda5, 0x1c7218e96c14717e, 0x1}, 0x18) r8 = socket(0x10, 0x80002, 0x0) accept4$unix(r7, 0x0, &(0x7f0000000080), 0x40800) epoll_create(0x1200) r9 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) preadv(r9, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/238, 0xee}], 0x1, 0x0) r10 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) preadv(r10, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/238, 0xee}], 0x1, 0x0) bind$netlink(r8, &(0x7f0000177ff4)={0x10, 0x0, 0x1, 0x8001002}, 0xc) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r12 = socket$nl_route(0x10, 0x3, 0x0) splice(r11, 0x0, r12, 0x0, 0x1420000a77, 0x0) connect$netlink(r2, &(0x7f0000000200)=@unspec, 0xffffffffffffffd6) write(r8, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r8, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r8, &(0x7f00000001c0)="83801cfe613ec087a81e32f96c7fb0c8ad8559a574fc5e011a2b932b800a642c765a609391a450ed4a40e0e5bf", 0x2d, 0x0, 0x0, 0x0) recvmmsg(r8, &(0x7f0000004600), 0xed7622b9347fca36, 0x2, 0x0) sendfile(r5, r7, &(0x7f0000000140), 0x8fff) 03:20:23 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, 0x0) 03:20:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:23 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) [ 286.251065] ptrace attach of "/root/syz-executor.3"[11069] was attempted by "/root/syz-executor.3"[11073] 03:20:23 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @loopback}, {0x0, @dev}, 0x0, {0x2, 0x0, @multicast2}, 'dummy0\x00'}) 03:20:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 03:20:23 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:23 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) [ 286.377663] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) [ 286.393840] SELinux: failed to load policy 03:20:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$dupfd(r0, 0x0, r1) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) pipe2$9p(&(0x7f00000045c0), 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) openat$tun(0xffffffffffffff9c, &(0x7f0000004600)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f00000001c0), 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) pipe2$9p(&(0x7f0000005080), 0x0) socket$unix(0x1, 0x1, 0x0) pipe2$9p(&(0x7f00000050c0), 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f00000001c0), 0x0) pipe2(&(0x7f00000001c0), 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001340)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_tables_names\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) [ 286.479934] ptrace attach of "/root/syz-executor.3"[11109] was attempted by "/root/syz-executor.3"[11111] [ 286.518521] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) 03:20:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 286.534056] SELinux: failed to load policy [ 286.622135] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15969 sclass=netlink_route_socket pig=11122 comm=syz-executor.2 [ 287.131258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15969 sclass=netlink_route_socket pig=11135 comm=syz-executor.2 03:20:24 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r0, r1, 0x0, 0x88008) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000b00)=ANY=[@ANYRESOCT=r2], 0x1, 0x1) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r3, r4, 0x0, 0x88008) getsockname$packet(r4, &(0x7f0000000240), &(0x7f0000000280)=0x14) r5 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r5, r6, 0x0, 0x88008) getsockname$packet(r6, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000580)={0x0, 0x67, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_OIF={0x8, 0x4, r9}]}, 0x24}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r10, &(0x7f0000000580)={0x0, 0x67, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_OIF={0x8, 0x4, r12}]}, 0x24}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket(0x11, 0x800000003, 0x0) bind(r14, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r14, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r13, &(0x7f0000000580)={0x0, 0x67, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x24, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_OIF={0x8, 0x4, r15}]}, 0x24}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r16 = socket(0x11, 0x800000003, 0x0) bind(r16, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r16, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) 03:20:24 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f00000001c0)) 03:20:24 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x1a5, &(0x7f0000000640)={&(0x7f00000001c0)={0x1c, 0x10, 0x306b0b374152df57, 0x0, 0x0, {0x3}}, 0x1c}}, 0x0) 03:20:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:24 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) [ 287.707922] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) [ 287.737217] SELinux: failed to load policy 03:20:24 executing program 3: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETGROUP(r3, 0x400454ce, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 03:20:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 287.834299] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) [ 287.855844] SELinux: failed to load policy 03:20:24 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000600)={0xffffffffffffff22, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000340)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR64, @ANYRESOCT, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRES64, @ANYPTR64, @ANYRES64=0x0, @ANYRESDEC, @ANYRESOCT, @ANYRES64]], @ANYBLOB="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"/282, @ANYRESHEX, @ANYRESDEC=0x0, @ANYRESDEC, @ANYPTR64, @ANYRES32, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES64], @ANYRESDEC], 0x4240a35b) 03:20:24 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:24 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0), 0x4) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r3 = creat(0x0, 0x9c) ioctl$EVIOCGKEYCODE(r3, 0x80084504, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r5 = accept4$unix(r4, &(0x7f0000000500)=@abs, &(0x7f0000000080)=0x577f048e36ad02a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x7c774aac) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x19e6, 0x7ff}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) clock_settime(0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r4, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') ioctl$sock_TIOCINQ(r6, 0x541b, &(0x7f0000000400)) r7 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) r8 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r9 = socket$inet(0x2, 0x4000000000000001, 0x0) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/status\x00', 0x0, 0x0) r11 = accept$unix(r10, 0x0, &(0x7f00000006c0)=0xfffffffffffffe80) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000680)=0x152) ioctl$sock_netdev_private(r11, 0x89fc, &(0x7f0000000600)="18e876c0fa9bd1944faa1d3af19d3dca953822f55dffb9a7b8bf82db7bd83554b77d8227192dd48e34b82d5386ac34e3d00d4dfe438ae4ca14d7de83ba75f42011cefb0b8feb3dbec5927dc342739a4dbfdd130111ab967130bda40298365b99378e") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, &(0x7f0000000340)) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r12 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) fcntl$setpipe(r12, 0x407, 0x1) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, r12, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)=0x0) setsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@remote, @in6=@loopback, 0x0, 0x101, 0x0, 0x0, 0x1e, 0x20, 0x0, 0x3c, 0x0, r13}, {0x800, 0xfffffffffffffffe, 0x19, 0x0, 0x100000001, 0x9, 0x6}, {0x8000, 0x2a, 0x800, 0x6e49}, 0x400, 0x6e6bb0, 0x1, 0x0, 0x1, 0x2}, {{@in6=@rand_addr="3e8ae26637e581fee0d3ae44f5aff1c1", 0x4d4}, 0x2, @in=@empty, 0x0, 0x0, 0x0, 0x1, 0xffffffff, 0x1db1}}, 0xe8) readlinkat(r12, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)=""/125, 0x7d) keyctl$search(0xa, r7, 0x0, &(0x7f0000000300)={'syz', 0x0}, r8) 03:20:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 288.182670] binder: 11181:11183 ioctl c018620c 20000600 returned -22 03:20:25 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@bridge_dellink={0x2c, 0x11, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, [{0x4, 0x7}, {0x4, 0x7}]}]}, 0x2c}}, 0x0) 03:20:25 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:25 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") syz_open_procfs(0x0, &(0x7f0000000100)='attr/curr\x8e\x82z\xdaBcK\xd0\x85\x88\xaf\xc4\x94\xb3\x92[\x1aH\xc1*5\xcf\x16\x7f\xcc\xe1\xf9\xdb\\+\xb5\xad\xb9o\xeaq\xc3\x14\x83R\x1c\'h\xa8F7\x90\x11\x1a\x1fE\x86*wZ$\xae\xfe\a\xf8\x01\xdb\xb4\x93\xd7e4\xc1\xa8\xdf\x9eK5WoKr\xa5A\xba.\xe8\xe2\t\x9e\x83\xef\x9e\x14\xa1\x97\xd8\xeb.y\xa0\x90T\a\x19V\xd2\x86LP&\xa8\x82\xedbA9\x16\xe8\x89=\xc3\xff2h\x97Y\x98\x92\x83`\xb7\xceMn\xe1fQ\xa5s\x1c\xab\xc1\x96\x1c\x82\x8d0\'\xee\xa9`\x94G\x89/\x80\xe96\xdb\xd3\x95\x00') 03:20:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x1008147c) 03:20:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 288.514174] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) [ 288.535466] SELinux: failed to load policy [ 288.559250] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8224 sclass=netlink_route_socket pig=11225 comm=syz-executor.2 03:20:25 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:25 executing program 3: socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000340)) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) epoll_create1(0x0) socket$nl_generic(0x10, 0x3, 0x10) epoll_create1(0x0) pipe(&(0x7f0000000340)) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) open(&(0x7f00000016c0)='./bus\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 03:20:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x13, 0x0, &(0x7f00000000c0)) 03:20:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 288.709170] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) 03:20:25 executing program 2: syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc001084}, 0xc, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x84}, 0x8004) fchdir(0xffffffffffffffff) creat(0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x200) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 288.734877] audit: type=1804 audit(1574133625.525:103): pid=11243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=17181 res=1 [ 288.751481] SELinux: failed to load policy 03:20:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x5}}, 0xe8) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 03:20:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 288.883879] audit: type=1804 audit(1574133625.525:104): pid=11243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=17181 res=1 [ 288.901836] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) [ 288.943707] SELinux: failed to load policy [ 288.943862] audit: type=1804 audit(1574133625.525:105): pid=11243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=17181 res=1 [ 289.038174] audit: type=1804 audit(1574133625.565:106): pid=11243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="bus" dev="sda1" ino=17181 res=1 [ 289.062829] audit: type=1804 audit(1574133625.565:107): pid=11251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=17181 res=1 [ 289.111046] audit: type=1804 audit(1574133625.565:108): pid=11243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=17181 res=1 [ 289.138258] audit: type=1804 audit(1574133625.565:109): pid=11251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=17181 res=1 03:20:26 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:26 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c5ebf5c5932eec510100019b3d7280437a7462010000000000000029a741efca44f937d0492482ba834057548c402cc43b3897ccb5430331f633e7ec2bc40d42cc3aa39f2441d8ece5ff1b9d9e2afb674462b435729c12b0f1c4872b0001000000000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d0734bc1e5566b4d1447a982f0b0b061ef0000000", @ANYRESHEX], 0x0, 0x101}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:20:26 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x400000000001) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x19) r2 = dup2(r1, r0) r3 = accept4(r2, 0x0, 0x0, 0x0) close(r3) 03:20:26 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30}, 0x30) 03:20:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 289.295846] ptrace attach of "/root/syz-executor.3"[11284] was attempted by "/root/syz-executor.3"[11285] 03:20:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 289.340507] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) [ 289.348578] SELinux: failed to load policy 03:20:26 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:26 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:26 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) setns(r0, 0x2040000) fchdir(r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000800)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x68, 0x2}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40040}, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/exec\x00', 0x2, 0x0) r4 = open(&(0x7f0000000480)='./bus\x00', 0x141046, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00E8\xddV\x82li\x1d/y6\xa2\xea\xff7\xcaz\xb1\x04\xa5\x14[\x1d+5B\\q.\x11\x91Y\xe0\xcb\xc5.$\x13h\xac\x89\xca\x86\x11\x03\x1c\x9d\x06KB\x05,\x84>\x84i\x10\x96\xf1BC\xb31\x7f\x96\x7f\x82\"2\x00\x00\x00\x00\x00') socket(0x2, 0x2, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x101}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000940)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000300)=ANY=[]) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000009c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16, @ANYBLOB="10002cbd7000fcdbdf2515000000440009080800020000000000080001000000000008000200e55d0000080002009104000008000200a800000008000100f7ffffff08000200980e000008000200040000000c00060008000100090000ffc2ac1490be9197db688dfbdc4ca526c241932f2c30fc10233b32ec2696651487e0045ef385"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000894) sched_setparam(0x0, &(0x7f0000000500)=0xfffd) stat(0x0, &(0x7f0000000680)) r6 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, 0x0, &(0x7f0000000100)) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f00000003c0)={0x50, 0xfffffffffffffffe, 0x1, {0x7, 0x1f, 0x0, 0x0, 0x1a27, 0x0, 0x0, 0x4}}, 0x50) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$TIOCGSID(r7, 0x5429, 0x0) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) r9 = gettid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r9, 0x3c) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r9, 0x0, 0x0) getpgrp(0x0) 03:20:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:26 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) [ 289.528719] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) [ 289.563290] SELinux: failed to load policy 03:20:26 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 289.653862] SELinux: policydb table sizes (-65536,2160895) do not match mine (8,7) [ 289.674405] SELinux: failed to load policy 03:20:26 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)="9a185c", 0x3}]) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="00d3ba0610000014660f3423"], 0xc}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 03:20:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:26 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:26 executing program 2: socket(0x0, 0xb44139ede2052a7e, 0x0) socket(0x0, 0x80002, 0x0) socket(0x0, 0x5, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x400}, {}], 0x2, &(0x7f0000000400), &(0x7f0000000440)={0x7ecb931}, 0x8) getegid() openat$selinux_context(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/context\x00', 0x2, 0x0) r3 = getegid() setregid(0x0, r3) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket(0x10, 0x0, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000000c0)) 03:20:26 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) [ 290.259250] ptrace attach of "/root/syz-executor.3"[11355] was attempted by "/root/syz-executor.3"[11359] 03:20:29 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:29 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:29 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:29 executing program 3: socket(0x2, 0x2, 0xfa) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = open(0x0, 0x400, 0x1) fchdir(r0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r5, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r6}], 0x1, 0x0) dup2(r5, 0xffffffffffffffff) poll(&(0x7f0000b2c000), 0x0, 0xffffffffffbffff8) dup2(r3, r4) getsockopt(r3, 0x7, 0x20, &(0x7f0000000500)=""/158, &(0x7f0000000400)=0x9e) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x50000, 0x0) ioctl(r0, 0xebd6, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCGPTPEER(r2, 0x5441, 0xffffffffffffffff) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x107fffffff) socketpair(0x5, 0x800, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) write$P9_RWRITE(r1, &(0x7f0000000080)={0x9e, 0x77, 0x0, 0xffff}, 0xfffffffffffffe42) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(r7, &(0x7f0000000200)=""/250, 0x50c7e3e3) pipe(0x0) io_setup(0x8000009, &(0x7f0000000180)) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000300)=0xfffffffffffffeb4) r8 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r8, 0x400, 0x0) r9 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000340)='threaded\x00', 0xffffffc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r9, 0x660c) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/q\x00!\x14z%\xd3\xeb\x00', 0x0, 0x0) 03:20:29 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f0000000180)=0x4) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e70e) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sched_setparam(0x0, &(0x7f0000000140)) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x11) fcntl$setstatus(r5, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f0000000180)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, 0x50) clone(0x2142001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x11000490) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d9189) socket(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x8) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FIDEDUPERANGE(r6, 0xc0189436, &(0x7f0000000440)=ANY=[@ANYBLOB="000000000000d7000000000000000000000006000000000000a1493343ccb69cc535c5f28a31b409df160f5bafe41612bfdfc235a6abe4b5354ec328132ba8addfd0f7d6d19dc7d347a52ec8b68b75c4d95471d63bcddff1bbfca41134759ee094bf67040fa165727014efcbc787bdaf3ae69d9a769eac7e8ce74ea0353b0c46b0f7040061aec711e5dea2d0d278f235a2f73f89f941bfe566753b6b863d013a84be215082e365b817493ca0"]) ioctl$RNDGETENTCNT(r6, 0x80045200, &(0x7f0000000340)) r7 = gettid() r8 = socket$inet6(0xa, 0x400000000001, 0x0) r9 = dup(r8) ioctl$FS_IOC_SETFLAGS(r9, 0x40046602, &(0x7f0000000640)=0x1) ioctl$UI_SET_SNDBIT(r9, 0x4004556a, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) r10 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r9, r10, 0x0, 0x8000fffffffe) ioctl$TIOCGSID(r10, 0x5429, &(0x7f0000000380)) r11 = syz_open_procfs(r7, &(0x7f00000001c0)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r11, &(0x7f00000000c0)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) accept4$unix(r11, 0x0, &(0x7f0000000000), 0x800) write$smack_current(r11, &(0x7f0000000240)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r12 = open(&(0x7f0000022ff6)='./control\x00', 0x20000, 0x0) mkdirat(r12, &(0x7f0000000100)='./control\x00', 0x0) 03:20:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:29 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:29 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) 03:20:29 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ffff"], 0x2c) [ 292.852568] IPVS: ftp: loaded support on port[0] = 21 03:20:32 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:32 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:20:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:32 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000001014e"], 0x8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 03:20:32 executing program 2: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfb120eb7) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6(0xa, 0x0, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0xb309a17e871cc587}, 0x14}}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2a4000, 0x0) fsetxattr$security_ima(r2, &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000440)=@sha1={0x1, "f6c22f460365f9360c48948b1b0b911ab5185102"}, 0x15, 0x2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000380)=@md5={0x1, "86ee741e65596c5d12183d4e4a409aa4"}, 0x1, 0x2) ioctl$FIBMAP(r1, 0x1, &(0x7f00000004c0)) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000540)="9033877ace25a0cd47de5752f2fe725302f5297240df794a3f9e8efd1c159b2bb4cfdc71f2cd4ccab950100494", 0x2d}, {&(0x7f0000001c40)}, {&(0x7f00000002c0)="f7fc370763ed7a4dbfaf549cd1dc94c047d2bfd2da573ebddcf5db435637f045346375f1b75c21a0106605fa2c283aaa0014062099dc4b58d700b3a07dbc83010c24cb730b30aee0103d81b75a4f6ce90dd0237bd4b22d66e95966a0ad75b3f8338268b29e2dd7c9", 0x68}, {0x0}], 0x4}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000080)="4326b5be4c72829e48001bfdce33d9a34689f07e340cec408be4e862cc21d93ea75e6e79c33cb2966b5a3e0a60677b6dbbb84bd6946d811304b2269c4dfbf4b5", 0x40}, {&(0x7f0000000b40)="70799d7f93aee25740609238367b30d5bd2da4a8a782f1e2bfe6e09ea5587d2488139bce0b6720aa3beec624a66fba665935593f143410e814194574d6c5caa5a0a643a77a", 0x45}, {0x0}, {&(0x7f0000000f40)="54a0e828872fe6e9bda086485e7f3bde08422042e5a05f13bea1486085300093f4a5a4abda46a4397be6331a2788d84995d0682db2ecba4cc024be1f493430feba24e7ef0e3987eb5ab799e035467f84ea4affb56e6ec3c3ec6bedb3a146f7d5ac1dd0fbbe738f75eec6fcfb55946d08623418c6a554fa5ae4bab3e352df47136233937c1c3ddd6c5bee1826a294c32a78eca238409a18e551720236a1187feb5975a28f5bbb83c8ad97f63537144bdffef8a43b62aa89d46cfed06318678870256e07a42a6f989ca29cce7992fdbbecb9407eceea5cd8b6daac884fc609af653c90b36f4ff03477eaebeeb62ade20c9c0a65cee56e82e9168cbebc2fbddf931caaa483bc10127aa87b13e88929aaba33011d800a0771d8d90cd838a4f34cd7faa044f9713f5d3e2d7be15ec44f4196799fe8f6705af7e23a81e33f5d3dd1236ecbec240ef8ebfe4df5bd1783f8730828da1357f7e1a66bb475d76bacbeb41818e016de90130f5796cf7ffa4cc28fca35fa3db8a271c150ee10c296bee997fdf46b06372b7f1b2a7d8159baaee675a02e5b4185fb68c337a3ccf92ebb8b836f6a70342c533229f978ba5f3ebb9460df23739be87b9aa01bd1a804f40d744d0cc060b44a520a4a1dd3e95c86150a9fb914d34bc6b61d91f344aacee3c94c1040e867d5cd4d37687bf685a27216307431b31f486b22da39374da24ad1cd61b98855c1eb493245ba97333227c45cb4e5743e119423a42cf73721e1ca0e5cade1f4c0f1c7d098ce5baa5adcd1d73eee5f7498617c5bd00181f3364d7f1a0f54f5633aa8e7ec42244f023b2d5a311933e9a52f68e8c3e46caa6d9611ca5d3216caf842275c9bcaf6503245ccda6d53907ca4ac3af4452896044b41ab55884d5cdbcf048044eb5d1cc5691f5142751f3c7e214afaede155e713e72cb9634e4de1f661527cca426983d788e31d6b0c831383d2140a7b9b134f6e68b0378589532b11bba1008347dfb481ff083177ca4d4454c32011fd1e9fa1bfe8698f1791a4097bc5ec4e0b1d8a93f457a2263d391d1", 0x2ed}], 0x4}}], 0x2, 0x80) sendto$inet(r3, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) 03:20:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 295.621919] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 295.632591] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 295.638811] CPU: 0 PID: 11434 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 295.645981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.655351] Call Trace: [ 295.657963] dump_stack+0x142/0x197 [ 295.661610] warn_alloc.cold+0x96/0x1af [ 295.665604] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 295.670621] ? lock_downgrade+0x740/0x740 [ 295.674798] ? avc_has_perm+0x2df/0x4b0 [ 295.678938] __vmalloc_node_range+0x3c3/0x6a0 [ 295.683467] ? trace_hardirqs_on+0x10/0x10 [ 295.687730] vmalloc+0x46/0x50 [ 295.691052] ? sel_write_load+0x1a0/0x1050 [ 295.695299] sel_write_load+0x1a0/0x1050 [ 295.699379] ? save_trace+0x290/0x290 [ 295.703200] ? sel_read_bool+0x240/0x240 [ 295.707278] ? trace_hardirqs_on+0x10/0x10 [ 295.711830] ? save_trace+0x290/0x290 [ 295.715831] __vfs_write+0x105/0x6b0 [ 295.719845] ? __lock_is_held+0xb6/0x140 [ 295.723960] ? sel_read_bool+0x240/0x240 [ 295.728171] ? kernel_read+0x120/0x120 [ 295.732085] ? __lock_is_held+0xb6/0x140 [ 295.736171] ? check_preemption_disabled+0x3c/0x250 [ 295.741224] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 295.746697] ? rcu_read_lock_sched_held+0x110/0x130 [ 295.751739] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 295.756520] ? __sb_start_write+0x153/0x2f0 [ 295.760996] vfs_write+0x198/0x500 [ 295.764571] SyS_write+0xfd/0x230 [ 295.768096] ? SyS_read+0x230/0x230 03:20:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 295.771904] ? do_syscall_64+0x53/0x640 [ 295.775909] ? SyS_read+0x230/0x230 [ 295.779582] do_syscall_64+0x1e8/0x640 [ 295.783842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.788725] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 295.793932] RIP: 0033:0x45a639 [ 295.797141] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 295.804875] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 295.807589] tc_dump_action: action bad kind 03:20:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 295.812162] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 295.812168] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 295.812172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 [ 295.812177] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff 03:20:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, &(0x7f0000000140)) pipe(&(0x7f0000000200)) [ 295.954125] Mem-Info: [ 295.956869] active_anon:252675 inactive_anon:2390 isolated_anon:0 [ 295.956869] active_file:8285 inactive_file:12245 isolated_file:0 [ 295.956869] unevictable:0 dirty:200 writeback:0 unstable:0 [ 295.956869] slab_reclaimable:12545 slab_unreclaimable:105091 [ 295.956869] mapped:59176 shmem:10849 pagetables:3855 bounce:0 [ 295.956869] free:1138829 free_pcp:321 free_cma:0 [ 296.019024] Node 0 active_anon:994212kB inactive_anon:9560kB active_file:33000kB inactive_file:48980kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236704kB dirty:796kB writeback:0kB shmem:43396kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 690176kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 296.071432] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 296.099211] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 296.126126] lowmem_reserve[]: 0 2580 2580 2580 [ 296.131815] Node 0 DMA32 free:769512kB min:36468kB low:45584kB high:54700kB active_anon:994132kB inactive_anon:9556kB active_file:33004kB inactive_file:49000kB unevictable:0kB writepending:824kB present:3129332kB managed:2644872kB mlocked:0kB kernel_stack:10560kB pagetables:15156kB bounce:0kB free_pcp:1384kB local_pcp:700kB free_cma:0kB [ 296.168733] lowmem_reserve[]: 0 0 0 0 [ 296.174722] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 296.219302] lowmem_reserve[]: 0 0 0 0 [ 296.223410] Node 1 Normal free:3785740kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 296.251653] lowmem_reserve[]: 0 0 0 0 [ 296.255652] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 296.269786] Node 0 DMA32: 3938*4kB (UME) 1561*8kB (UME) 1187*16kB (UME) 1034*32kB (M) 683*64kB (UME) 222*128kB (UM) 108*256kB (UME) 61*512kB (UME) 23*1024kB (UM) 6*2048kB (UME) 128*4096kB (UM) = 771456kB [ 296.288534] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 296.299766] Node 1 Normal: 59*4kB (UME) 342*8kB (UE) 277*16kB (UM) 55*32kB (UM) 17*64kB (UM) 8*128kB (U) 8*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785740kB [ 296.316978] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 296.326220] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 296.335672] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 296.345045] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 296.353873] 31372 total pagecache pages [ 296.358020] 0 pages in swap cache [ 296.361733] Swap cache stats: add 0, delete 0, find 0/0 [ 296.367507] Free swap = 0kB [ 296.370866] Total swap = 0kB [ 296.374023] 1965979 pages RAM [ 296.377421] 0 pages HighMem/MovableOnly [ 296.381735] 333233 pages reserved [ 296.385526] 0 pages cma reserved 03:20:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:35 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r4, &(0x7f0000000980)=[{&(0x7f00000005c0)="e5", 0x1}], 0x1, 0x4081806) sendfile(r2, r4, 0x0, 0x20020102000007) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f00000000c0)={@loopback, @multicast2, @multicast2}, 0x0) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r6, 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000040)='lo\x00') vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(r7, &(0x7f0000000340)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) recvfrom$unix(r3, &(0x7f0000000280)=""/4, 0xfffffffffffffe16, 0x100, &(0x7f0000000100)=@abs, 0x930212) ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x7, 0xffffffffffffffff, 0x100000000, 0x40) ptrace$cont(0x7, r0, 0x0, 0x0) 03:20:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000300)=""/181, 0x2ee) getdents64(r1, 0x0, 0x0) 03:20:35 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:20:35 executing program 0: timer_create(0x0, 0x0, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4003fe) r3 = open(0x0, 0x4000, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fallocate(r1, 0x0, 0x0, 0x84003ff) [ 298.617655] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 298.631309] ptrace attach of "/root/syz-executor.2"[11476] was attempted by "/root/syz-executor.2"[11481] [ 298.634994] syz-executor.4 cpuset= [ 298.663818] syz4 mems_allowed=0-1 [ 298.677122] CPU: 0 PID: 11480 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 298.684548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.693912] Call Trace: [ 298.696524] dump_stack+0x142/0x197 [ 298.700203] warn_alloc.cold+0x96/0x1af [ 298.704205] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 298.709250] ? lock_downgrade+0x740/0x740 [ 298.713429] ? avc_has_perm+0x2df/0x4b0 [ 298.717431] __vmalloc_node_range+0x3c3/0x6a0 [ 298.721955] ? trace_hardirqs_on+0x10/0x10 [ 298.726213] vmalloc+0x46/0x50 [ 298.729417] ? sel_write_load+0x1a0/0x1050 [ 298.733665] sel_write_load+0x1a0/0x1050 [ 298.737741] ? save_trace+0x290/0x290 [ 298.741583] ? sel_read_bool+0x240/0x240 [ 298.745660] ? trace_hardirqs_on+0x10/0x10 [ 298.749920] ? save_trace+0x290/0x290 [ 298.753749] __vfs_write+0x105/0x6b0 [ 298.757487] ? __lock_is_held+0xb6/0x140 [ 298.761572] ? sel_read_bool+0x240/0x240 [ 298.765649] ? kernel_read+0x120/0x120 [ 298.769549] ? __lock_is_held+0xb6/0x140 [ 298.773622] ? check_preemption_disabled+0x3c/0x250 [ 298.778658] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 298.784128] ? rcu_read_lock_sched_held+0x110/0x130 [ 298.789163] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 298.793945] ? __sb_start_write+0x153/0x2f0 [ 298.798285] vfs_write+0x198/0x500 [ 298.801848] SyS_write+0xfd/0x230 [ 298.805318] ? SyS_read+0x230/0x230 [ 298.808967] ? do_syscall_64+0x53/0x640 [ 298.812981] ? SyS_read+0x230/0x230 [ 298.816622] do_syscall_64+0x1e8/0x640 [ 298.820521] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:20:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_IOCTL(r0, 0x0, 0x0) 03:20:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, 0x0) 03:20:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x323) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, 0x0, 0x44) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000180)) r4 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) r5 = socket(0x10, 0x80002, 0x0) bind$netlink(r5, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r5, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r5, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xc, 0xffffffffffffffff) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write$P9_RSTAT(r2, &(0x7f00000002c0)=ANY=[@ANYRES32], 0x4) sendto(r5, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x40800, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x204) ioctl(0xffffffffffffffff, 0x8, &(0x7f0000000580)) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000480)={@loopback}, 0x14) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./bus\x00'}, 0x10) recvmmsg(r5, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) sendfile(r1, r4, &(0x7f0000000080), 0x9001) 03:20:35 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0x29a, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @initdev}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r2, &(0x7f0000004f40), 0x3ffffffffffff80, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000013) [ 298.825387] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 298.830588] RIP: 0033:0x45a639 [ 298.833782] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 298.841732] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 298.849021] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 298.855361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11498 comm=syz-executor.2 [ 298.856297] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:20:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 298.856303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 [ 298.856309] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff [ 298.881784] Mem-Info: [ 298.894175] active_anon:249112 inactive_anon:2388 isolated_anon:0 [ 298.894175] active_file:8286 inactive_file:12254 isolated_file:0 [ 298.894175] unevictable:0 dirty:209 writeback:0 unstable:0 [ 298.894175] slab_reclaimable:12547 slab_unreclaimable:106037 [ 298.894175] mapped:59176 shmem:10849 pagetables:3847 bounce:0 [ 298.894175] free:1141464 free_pcp:242 free_cma:0 [ 298.955015] Node 0 active_anon:998612kB inactive_anon:9552kB active_file:33004kB inactive_file:49016kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236804kB dirty:832kB writeback:0kB shmem:43396kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 684032kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 298.996268] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 299.032960] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 299.059343] lowmem_reserve[]: 0 2580 2580 2580 [ 299.064536] Node 0 DMA32 free:764436kB min:36468kB low:45584kB high:54700kB active_anon:996456kB inactive_anon:9544kB active_file:33012kB inactive_file:49016kB unevictable:0kB writepending:840kB present:3129332kB managed:2644872kB mlocked:0kB kernel_stack:10656kB pagetables:15300kB bounce:0kB free_pcp:1284kB local_pcp:544kB free_cma:0kB [ 299.103099] lowmem_reserve[]: 0 0 0 0 [ 299.108453] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 299.135458] lowmem_reserve[]: 0 0 0 0 [ 299.139363] Node 1 Normal free:3785740kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 299.167116] lowmem_reserve[]: 0 0 0 0 [ 299.171100] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 299.184959] Node 0 DMA32: 3821*4kB (UME) 2099*8kB (UME) 1229*16kB (UME) 1040*32kB (UM) 568*64kB (UME) 222*128kB (UM) 108*256kB (UME) 61*512kB (UME) 23*1024kB (UM) 5*2048kB (UME) 128*4096kB (UM) = 766748kB [ 299.208838] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 299.230288] Node 1 Normal: 59*4kB (UME) 342*8kB (UE) 277*16kB (UM) 55*32kB (UM) 17*64kB (UM) 8*128kB (U) 8*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785740kB [ 299.247871] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 299.257473] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 299.266346] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 299.275762] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 299.284603] 31383 total pagecache pages [ 299.288748] 0 pages in swap cache [ 299.292726] Swap cache stats: add 0, delete 0, find 0/0 [ 299.298272] Free swap = 0kB [ 299.301911] Total swap = 0kB [ 299.305127] 1965979 pages RAM [ 299.308410] 0 pages HighMem/MovableOnly [ 299.312847] 333233 pages reserved [ 299.316421] 0 pages cma reserved [ 299.651941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28207 sclass=netlink_route_socket pig=11516 comm=syz-executor.2 03:20:38 executing program 0: timer_create(0x0, 0x0, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:38 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x2) chown(&(0x7f0000001800)='./file0\x00', 0x0, 0x0) 03:20:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:20:38 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 03:20:38 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001600)={0x5, 0x8000, 0x0, 0x101, 0x9, 0x31aa}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0xd432}) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) pipe(&(0x7f0000000000)) syz_open_dev$loop(0x0, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000001c0)) ftruncate(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x81ff) r1 = socket(0x200000100000011, 0x2, 0x0) bind$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="962c85e043d8"}, 0x14) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2b) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000001640)='security.SMACK64TRANSMUTE\x00', &(0x7f00000013c0)='TRUE', 0x21ab817d868be393, 0x3) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) dup2(r5, r0) sendfile(r3, r4, 0x0, 0x80000001) r6 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x1fb) r7 = open(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) ftruncate(r7, 0x2007fff) memfd_create(&(0x7f0000000240)='.^\x00', 0x0) r8 = creat(&(0x7f0000000480)='./bus\x00', 0x0) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r10, r10, &(0x7f00000002c0)=0x202, 0xdd) getpeername$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r11}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'sit0\x00', r11}) bind$packet(r9, &(0x7f00000012c0)={0x11, 0x4, r11, 0x1, 0x6, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0xfffffffffffffdbb) lseek(r8, 0x0, 0x0) sendfile(r8, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc) sendfile(r8, r9, &(0x7f0000000040), 0x8000fffffffe) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r12, 0xffffffffffffffff, &(0x7f00000002c0)=0x202, 0xdd) getpeername$packet(r12, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x4d, r13}) bind$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x4, 0x0, 0x1, 0x6, 0x6, @dev={[], 0x27}}, 0x14) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x8000fffffffe) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) r14 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r15 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r15, 0xffffffffffffffff, &(0x7f00000002c0), 0xdd) getpeername$packet(r15, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'sit0\x00', r16}) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r14, 0x0, 0xfffffffffffffffc) sendfile(0xffffffffffffffff, r14, &(0x7f0000000040), 0x8000fffffffe) ioctl$LOOP_CLR_FD(r14, 0x4c01) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp\x00') [ 301.638204] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 301.669857] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 301.679508] CPU: 0 PID: 11524 Comm: syz-executor.4 Not tainted 4.14.154 #0 03:20:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 301.687056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.696429] Call Trace: [ 301.699041] dump_stack+0x142/0x197 [ 301.702963] warn_alloc.cold+0x96/0x1af [ 301.707691] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 301.712707] ? lock_downgrade+0x740/0x740 [ 301.712725] ? avc_has_perm+0x2df/0x4b0 [ 301.712743] __vmalloc_node_range+0x3c3/0x6a0 [ 301.712757] ? trace_hardirqs_on+0x10/0x10 [ 301.712771] vmalloc+0x46/0x50 [ 301.712780] ? sel_write_load+0x1a0/0x1050 [ 301.712789] sel_write_load+0x1a0/0x1050 [ 301.712798] ? save_trace+0x290/0x290 [ 301.712811] ? sel_read_bool+0x240/0x240 [ 301.725758] ? trace_hardirqs_on+0x10/0x10 [ 301.725770] ? save_trace+0x290/0x290 [ 301.725786] __vfs_write+0x105/0x6b0 [ 301.762763] ? __lock_is_held+0xb6/0x140 [ 301.767631] ? sel_read_bool+0x240/0x240 [ 301.772435] ? kernel_read+0x120/0x120 [ 301.776341] ? __lock_is_held+0xb6/0x140 [ 301.781585] ? check_preemption_disabled+0x3c/0x250 03:20:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat(r0, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 03:20:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 301.787633] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 301.793215] ? rcu_read_lock_sched_held+0x110/0x130 [ 301.798255] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 301.803038] ? __sb_start_write+0x153/0x2f0 [ 301.807384] vfs_write+0x198/0x500 [ 301.810944] SyS_write+0xfd/0x230 [ 301.814535] ? SyS_read+0x230/0x230 [ 301.818182] ? do_syscall_64+0x53/0x640 [ 301.823937] ? SyS_read+0x230/0x230 [ 301.829080] do_syscall_64+0x1e8/0x640 [ 301.833100] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:20:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 301.837974] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 301.844629] RIP: 0033:0x45a639 [ 301.844636] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 301.844645] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 301.844649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 301.844654] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 301.844660] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 03:20:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x2) [ 301.844665] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff 03:20:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 301.937667] audit: type=1804 audit(1574133638.725:110): pid=11525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/164/bus" dev="sda1" ino=17305 res=1 [ 301.953641] Mem-Info: [ 301.980827] active_anon:252194 inactive_anon:2388 isolated_anon:0 [ 301.980827] active_file:8290 inactive_file:12262 isolated_file:0 [ 301.980827] unevictable:0 dirty:221 writeback:0 unstable:0 [ 301.980827] slab_reclaimable:12546 slab_unreclaimable:106005 [ 301.980827] mapped:59176 shmem:10849 pagetables:3908 bounce:0 [ 301.980827] free:1138340 free_pcp:288 free_cma:0 [ 302.026857] audit: type=1804 audit(1574133638.725:111): pid=11525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/164/bus" dev="sda1" ino=17305 res=1 [ 302.059045] Node 0 active_anon:1008700kB inactive_anon:9552kB active_file:33020kB inactive_file:49048kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236704kB dirty:880kB writeback:0kB shmem:43396kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 688128kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 302.088431] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 302.114526] audit: type=1804 audit(1574133638.885:112): pid=11555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/164/bus" dev="sda1" ino=17305 res=1 [ 302.131105] Node 0 [ 302.141783] audit: type=1804 audit(1574133638.885:113): pid=11555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/164/bus" dev="sda1" ino=17305 res=1 [ 302.145608] DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 302.197117] lowmem_reserve[]: 0 2580 2580 2580 [ 302.202144] Node 0 DMA32 free:751444kB min:36468kB low:45584kB high:54700kB active_anon:1008736kB inactive_anon:9556kB active_file:33036kB inactive_file:49068kB unevictable:0kB writepending:924kB present:3129332kB managed:2644872kB mlocked:0kB kernel_stack:10560kB pagetables:15344kB bounce:0kB free_pcp:1144kB local_pcp:444kB free_cma:0kB [ 302.243140] lowmem_reserve[]: 0 0 0 0 [ 302.247142] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 302.272659] lowmem_reserve[]: 0 0 0 0 [ 302.276551] Node 1 Normal free:3785740kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 302.304600] lowmem_reserve[]: 0 0 0 0 [ 302.308422] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 302.322351] Node 0 DMA32: 3834*4kB (UME) 1804*8kB (UME) 1276*16kB (UME) 1042*32kB (UM) 571*64kB (UME) 223*128kB (UM) 108*256kB (UME) 61*512kB (UME) 23*1024kB (UM) 6*2048kB (UME) 128*4096kB (UM) = 767624kB [ 302.340830] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 302.351706] Node 1 Normal: 59*4kB (UME) 342*8kB (UE) 277*16kB (UM) 55*32kB (UM) 17*64kB (UM) 8*128kB (U) 8*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785740kB [ 302.368739] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 302.377633] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 302.386277] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 302.395324] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 302.403976] 31402 total pagecache pages [ 302.407952] 0 pages in swap cache [ 302.411444] Swap cache stats: add 0, delete 0, find 0/0 [ 302.416806] Free swap = 0kB [ 302.419809] Total swap = 0kB [ 302.422869] 1965979 pages RAM [ 302.425964] 0 pages HighMem/MovableOnly [ 302.429917] 333233 pages reserved [ 302.433426] 0 pages cma reserved 03:20:41 executing program 0: timer_create(0x0, 0x0, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x82000, 0x0) 03:20:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x2) 03:20:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:41 executing program 2: creat(&(0x7f00000001c0)='./bus\x00', 0x0) setxattr$security_selinux(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x0) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) 03:20:41 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[], 0x0) [ 304.696234] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 304.715471] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 304.725541] CPU: 0 PID: 11568 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 304.732922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.734304] audit: type=1400 audit(1574133641.515:114): avc: denied { relabelto } for pid=11562 comm="syz-executor.2" name="bus" dev="sda1" ino=17326 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 [ 304.742310] Call Trace: [ 304.742332] dump_stack+0x142/0x197 [ 304.742347] warn_alloc.cold+0x96/0x1af [ 304.742358] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 304.742374] ? lock_downgrade+0x740/0x740 [ 304.742388] ? avc_has_perm+0x2df/0x4b0 [ 304.742402] __vmalloc_node_range+0x3c3/0x6a0 [ 304.742414] ? trace_hardirqs_on+0x10/0x10 [ 304.800880] vmalloc+0x46/0x50 [ 304.804094] ? sel_write_load+0x1a0/0x1050 [ 304.808342] sel_write_load+0x1a0/0x1050 [ 304.812425] ? save_trace+0x290/0x290 [ 304.816259] ? sel_read_bool+0x240/0x240 [ 304.820354] ? trace_hardirqs_on+0x10/0x10 [ 304.824612] ? save_trace+0x290/0x290 [ 304.828620] __vfs_write+0x105/0x6b0 [ 304.832361] ? __lock_is_held+0xb6/0x140 [ 304.836445] ? sel_read_bool+0x240/0x240 [ 304.840559] ? kernel_read+0x120/0x120 [ 304.844471] ? __lock_is_held+0xb6/0x140 [ 304.848557] ? check_preemption_disabled+0x3c/0x250 [ 304.853637] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 304.859113] ? rcu_read_lock_sched_held+0x110/0x130 [ 304.864297] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 304.869497] ? __sb_start_write+0x153/0x2f0 [ 304.869510] vfs_write+0x198/0x500 [ 304.869522] SyS_write+0xfd/0x230 [ 304.869534] ? SyS_read+0x230/0x230 [ 304.869545] ? do_syscall_64+0x53/0x640 [ 304.869555] ? SyS_read+0x230/0x230 [ 304.869566] do_syscall_64+0x1e8/0x640 03:20:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:41 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2800000032001f000000000066f3069a08f8157414000100100001"], 0x1}}, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:20:41 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00', {}, 0x0, [], [], [0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000540)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3]}, 0x45c) 03:20:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 304.869574] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.869595] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 304.876822] audit: type=1400 audit(1574133641.515:115): avc: denied { read } for pid=11562 comm="syz-executor.2" name="bus" dev="sda1" ino=17326 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 [ 304.877482] RIP: 0033:0x45a639 [ 304.877489] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 03:20:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(0x0, 0x2) [ 304.877502] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 304.877508] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 304.877513] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.877522] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 03:20:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 304.888487] audit: type=1400 audit(1574133641.515:116): avc: denied { open } for pid=11562 comm="syz-executor.2" path="/root/syzkaller-testdir015242140/syzkaller.MubJI1/165/bus" dev="sda1" ino=17326 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 [ 304.888561] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff [ 304.901802] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 304.968449] audit: type=1804 audit(1574133641.515:117): pid=11574 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/165/bus" dev="sda1" ino=17326 res=1 [ 305.046717] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.058912] audit: type=1400 audit(1574133641.515:118): avc: denied { write } for pid=11562 comm="syz-executor.2" name="bus" dev="sda1" ino=17326 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 [ 305.058930] audit: type=1400 audit(1574133641.515:119): avc: denied { relabelfrom } for pid=11562 comm="syz-executor.2" name="bus" dev="sda1" ino=17326 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:lvm_control_t:s0 tclass=file permissive=1 [ 305.060496] input: syz1 as /devices/virtual/input/input19 [ 305.115660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.128191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.128550] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.128803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.165345] Mem-Info: [ 305.167785] active_anon:249676 inactive_anon:2388 isolated_anon:0 [ 305.167785] active_file:8295 inactive_file:12275 isolated_file:0 [ 305.167785] unevictable:0 dirty:244 writeback:0 unstable:0 [ 305.167785] slab_reclaimable:12544 slab_unreclaimable:106682 [ 305.167785] mapped:59176 shmem:10849 pagetables:3870 bounce:0 [ 305.167785] free:1140194 free_pcp:314 free_cma:0 [ 305.229943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.252655] input: syz1 as /devices/virtual/input/input20 [ 305.284730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.288377] Node 0 active_anon:1000920kB inactive_anon:9552kB active_file:33040kB inactive_file:49100kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236804kB dirty:972kB writeback:0kB shmem:43396kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 714752kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 305.302379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.327244] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 305.344920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.384165] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11578 comm=syz-executor.3 [ 305.406823] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 305.434707] lowmem_reserve[]: 0 2580 2580 2580 [ 305.445772] Node 0 DMA32 free:760028kB min:36468kB low:45584kB high:54700kB active_anon:996672kB inactive_anon:9552kB active_file:33040kB inactive_file:49100kB unevictable:0kB writepending:972kB present:3129332kB managed:2644872kB mlocked:0kB kernel_stack:10656kB pagetables:15480kB bounce:0kB free_pcp:928kB local_pcp:468kB free_cma:0kB [ 305.482221] lowmem_reserve[]: 0 0 0 0 [ 305.486307] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 305.518197] lowmem_reserve[]: 0 0 0 0 [ 305.527999] Node 1 Normal free:3785740kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 305.561672] lowmem_reserve[]: 0 0 0 0 [ 305.565787] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 305.584299] Node 0 DMA32: 4336*4kB (UME) 2341*8kB (UME) 1396*16kB (UME) 1151*32kB (UM) 550*64kB (UME) 231*128kB (UM) 109*256kB (UME) 61*512kB (UME) 23*1024kB (UM) 6*2048kB (UME) 123*4096kB (UM) = 758792kB [ 305.609736] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 305.627594] Node 1 Normal: 59*4kB (UME) 342*8kB (UE) 277*16kB (UM) 55*32kB (UM) 17*64kB (UM) 8*128kB (U) 8*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785740kB [ 305.650243] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 305.659819] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 305.672904] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 305.683691] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 305.696177] 31407 total pagecache pages [ 305.702105] 0 pages in swap cache [ 305.705736] Swap cache stats: add 0, delete 0, find 0/0 [ 305.714263] Free swap = 0kB [ 305.717457] Total swap = 0kB [ 305.722453] 1965979 pages RAM [ 305.725705] 0 pages HighMem/MovableOnly [ 305.736449] 333233 pages reserved [ 305.739957] 0 pages cma reserved 03:20:44 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:20:44 executing program 2: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f0000000100)={'system_u:object_r:hald_exec_t:s0', 0x20, 'system_u:object_r:restorecond_var_run_t:s0', 0x20, 0xd373, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x8f) 03:20:44 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) clone(0x2102201ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 03:20:44 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[], 0x0) 03:20:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:20:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:44 executing program 2: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x400000000000031, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3, 0x1c) 03:20:44 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in=@dev, @in=@multicast2}, {@in6=@loopback, 0x0, 0x33}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}, 0x0, 0xc0}}]}, 0x13c}}, 0x0) [ 307.756082] kauditd_printk_skb: 3 callbacks suppressed [ 307.756091] audit: type=1400 audit(1574133644.545:123): avc: denied { validate_trans } for pid=11606 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 307.789601] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 307.833420] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 307.857050] CPU: 0 PID: 11612 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 307.864381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.873897] Call Trace: [ 307.876508] dump_stack+0x142/0x197 03:20:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 307.880168] warn_alloc.cold+0x96/0x1af [ 307.884167] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 307.889156] ? lock_downgrade+0x740/0x740 [ 307.893334] ? avc_has_perm+0x2df/0x4b0 [ 307.897367] __vmalloc_node_range+0x3c3/0x6a0 [ 307.901882] ? trace_hardirqs_on+0x10/0x10 [ 307.906142] vmalloc+0x46/0x50 [ 307.909355] ? sel_write_load+0x1a0/0x1050 [ 307.913613] sel_write_load+0x1a0/0x1050 [ 307.917697] ? save_trace+0x290/0x290 [ 307.921523] ? sel_read_bool+0x240/0x240 [ 307.925593] ? trace_hardirqs_on+0x10/0x10 [ 307.925604] ? save_trace+0x290/0x290 [ 307.925620] __vfs_write+0x105/0x6b0 [ 307.933653] ? __lock_is_held+0xb6/0x140 [ 307.933663] ? sel_read_bool+0x240/0x240 [ 307.933675] ? kernel_read+0x120/0x120 [ 307.933685] ? __lock_is_held+0xb6/0x140 [ 307.933695] ? check_preemption_disabled+0x3c/0x250 [ 307.933710] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 307.964132] ? rcu_read_lock_sched_held+0x110/0x130 [ 307.969174] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 307.973966] ? __sb_start_write+0x153/0x2f0 [ 307.978435] vfs_write+0x198/0x500 [ 307.982138] SyS_write+0xfd/0x230 [ 307.985618] ? SyS_read+0x230/0x230 [ 307.989270] ? do_syscall_64+0x53/0x640 [ 307.993272] ? SyS_read+0x230/0x230 [ 307.996919] do_syscall_64+0x1e8/0x640 [ 308.000824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.005673] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 308.010855] RIP: 0033:0x45a639 [ 308.014099] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 308.021818] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 308.029091] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 308.036356] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 308.043735] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 [ 308.051000] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff [ 308.059209] Mem-Info: [ 308.061932] active_anon:249156 inactive_anon:2388 isolated_anon:0 [ 308.061932] active_file:8295 inactive_file:12286 isolated_file:0 [ 308.061932] unevictable:0 dirty:254 writeback:0 unstable:0 [ 308.061932] slab_reclaimable:12543 slab_unreclaimable:108235 [ 308.061932] mapped:59176 shmem:10849 pagetables:3902 bounce:0 [ 308.061932] free:1139068 free_pcp:253 free_cma:0 [ 308.097307] Node 0 active_anon:996616kB inactive_anon:9552kB active_file:33044kB inactive_file:49148kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236704kB dirty:1032kB writeback:0kB shmem:43396kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 710656kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 308.134272] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 308.164547] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 308.191172] lowmem_reserve[]: 0 2580 2580 2580 [ 308.195920] Node 0 DMA32 free:755432kB min:36468kB low:45584kB high:54700kB active_anon:996616kB inactive_anon:9552kB active_file:33044kB inactive_file:49148kB unevictable:0kB writepending:1036kB present:3129332kB managed:2644872kB mlocked:0kB kernel_stack:10656kB pagetables:15516kB bounce:0kB free_pcp:1180kB local_pcp:748kB free_cma:0kB [ 308.227602] lowmem_reserve[]: 0 0 0 0 [ 308.241600] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 308.267354] lowmem_reserve[]: 0 0 0 0 [ 308.271326] Node 1 Normal free:3785740kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 308.299326] lowmem_reserve[]: 0 0 0 0 [ 308.304466] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 308.324177] Node 0 DMA32: 4291*4kB (UME) 2735*8kB (UME) 1438*16kB (UME) 1165*32kB (UM) 524*64kB (ME) 191*128kB (UM) 109*256kB (UME) 61*512kB (UME) 23*1024kB (UM) 4*2048kB (UME) 124*4096kB (UM) = 756100kB [ 308.342868] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 308.353711] Node 1 Normal: 59*4kB (UME) 342*8kB (UE) 277*16kB (UM) 55*32kB (UM) 17*64kB (UM) 8*128kB (U) 8*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785740kB [ 308.370721] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 308.379562] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 308.388219] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 308.397107] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 308.405742] 31425 total pagecache pages [ 308.409715] 0 pages in swap cache [ 308.413251] Swap cache stats: add 0, delete 0, find 0/0 [ 308.418677] Free swap = 0kB [ 308.421910] Total swap = 0kB [ 308.424931] 1965979 pages RAM [ 308.428019] 0 pages HighMem/MovableOnly [ 308.432050] 333233 pages reserved [ 308.435498] 0 pages cma reserved 03:20:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) getsockopt$inet_int(r3, 0x0, 0x31, 0x0, &(0x7f00000000c0)=0x249) 03:20:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:47 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:20:47 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="0400cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2df", @ANYRES16=0x0, @ANYPTR64, @ANYRESDEC], 0x0, 0xcc}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:20:47 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[], 0x0) 03:20:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:47 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="640000002400010f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000240008001c0001000000400000000200100000000008000000000000000000000401020014000100706669666f5f686561645f64726f700018000200000000ab0d0d7998e90040bdc2add87619aa09005eb6878c2fbadff713a91db5d0f3b0fa27291ff682d0b5ee0d049cae3240f25fd180c1c9c0a6c3046932bdd2e12f39b3b135c0bddd00d4848cb81d05ddc54a7d11fb2110481aa9b9a960bab292e9705b4b8e65d8dbbfa6d4d2f3da41f90327f3a8989d3b3624968382e720c13d833f25e25772be350bc9858df039f2ea6dfa57b3f5e18acbe518697819a10a894f0ab2a877044b672af8d804bd0da51901e186a0d6a5b140f1d65d3c261c93bde2e596520bf8d67c9a94d80b49461c8504af613a1ceb4d3b39b6197ea1f32c264fb6c9915cc308abdb4ca0fe67558ca15ebe21f8c3cb6de0e025301cb3601d9f47767397625a7c9a59be72330debf4252cac9c27d4fe3edc54f7cedf020ca6769f18e6ab85e73b63bd694840e5d95ab6ca485ef62f0f43137cff548b14fc5950d888bb6ee7679daf323515678ce62fecdfc8f72797795eadfedbfd09be1fca7a9f3c8cc5cf1f3c19f8e6fef39844007fcc7b4db8d1229cf9d3a506301b6ab537e23bfe5ed593a2a4b044ad9c36f0d38ab78cdc18000000000000000000000000c037e7357d46fb5ea852126a9a75a8963e453f5171c93f4a734e31a99c8a0098f6bb77cef6070af9301b35d3a41f24270f13760500000000000000517e58ab5e837e36daca22a3d6f0c0878b0a0c4bdf48f493db6d54260c9502204ead0c5c2746e3b67b10239f76a54e316529600307d19b461e03613eac77f656079f4d8edc04428917ff6c2b6b80f7a8e2869bba81a24be7192217c43c5a9bc395f1084401bd6cc643f86e56b2318734e234e04e796120cf879f1b2cf72be558301cda6f772f6d3ea0d7fa069e97e01086394c1d1ce895388f329996060a5c0e57961c7b541f2b2036a245b87e38089d1823561c932483155d649858e8d0f054aad5ff8055496325e14d5ab31dd326134f72b5bbd1aeafd98d3e643552d213b6ea56a4c16e77187174fec6f941db10f0df631b7fb520e48d93"], 0x64}}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 310.835137] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 310.866880] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 310.882431] CPU: 1 PID: 11651 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 310.889526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.889532] Call Trace: [ 310.889550] dump_stack+0x142/0x197 [ 310.889566] warn_alloc.cold+0x96/0x1af [ 310.889578] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 310.914020] ? lock_downgrade+0x740/0x740 [ 310.918192] ? avc_has_perm+0x2df/0x4b0 [ 310.922211] __vmalloc_node_range+0x3c3/0x6a0 [ 310.926721] ? trace_hardirqs_on+0x10/0x10 [ 310.926737] vmalloc+0x46/0x50 [ 310.926748] ? sel_write_load+0x1a0/0x1050 [ 310.926756] sel_write_load+0x1a0/0x1050 [ 310.926766] ? save_trace+0x290/0x290 [ 310.926778] ? sel_read_bool+0x240/0x240 [ 310.932864] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 310.934200] ? trace_hardirqs_on+0x10/0x10 [ 310.934212] ? save_trace+0x290/0x290 [ 310.934227] __vfs_write+0x105/0x6b0 [ 310.934239] ? __lock_is_held+0xb6/0x140 [ 310.938634] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 310.942528] ? sel_read_bool+0x240/0x240 [ 310.942540] ? kernel_read+0x120/0x120 [ 310.942552] ? __lock_is_held+0xb6/0x140 [ 310.942561] ? check_preemption_disabled+0x3c/0x250 [ 310.942575] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 310.942586] ? rcu_read_lock_sched_held+0x110/0x130 [ 310.942594] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 310.942603] ? __sb_start_write+0x153/0x2f0 [ 310.942614] vfs_write+0x198/0x500 [ 310.950464] SyS_write+0xfd/0x230 [ 310.950478] ? SyS_read+0x230/0x230 [ 310.950489] ? do_syscall_64+0x53/0x640 [ 310.950498] ? SyS_read+0x230/0x230 [ 310.950508] do_syscall_64+0x1e8/0x640 [ 310.950516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.950531] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 311.052437] RIP: 0033:0x45a639 [ 311.055625] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 311.064000] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 311.071272] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 311.078547] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:20:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) fadvise64(r4, 0x0, 0x0, 0x4) 03:20:47 executing program 1: pipe(0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') setns(r0, 0x0) [ 311.085820] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 [ 311.093080] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff [ 311.103826] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 311.112550] Mem-Info: [ 311.112575] active_anon:250216 inactive_anon:2387 isolated_anon:0 [ 311.112575] active_file:8296 inactive_file:12297 isolated_file:0 [ 311.112575] unevictable:0 dirty:267 writeback:0 unstable:0 [ 311.112575] slab_reclaimable:12540 slab_unreclaimable:108202 [ 311.112575] mapped:59176 shmem:10849 pagetables:3915 bounce:0 [ 311.112575] free:1138062 free_pcp:167 free_cma:0 [ 311.112590] Node 0 active_anon:1000864kB inactive_anon:9548kB active_file:33044kB inactive_file:49188kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236704kB dirty:1064kB writeback:0kB shmem:43396kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 714752kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:20:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 311.112608] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 311.129731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 311.160348] Node 0 03:20:48 executing program 2: perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x400200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getsig(0x4209, r0, 0x75fffc, 0x0) 03:20:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 311.212512] audit: type=1804 audit(1574133648.005:124): pid=11673 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=17358 res=1 03:20:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 311.267206] DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 311.302101] audit: type=1804 audit(1574133648.035:125): pid=11672 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=17358 res=1 [ 311.337181] lowmem_reserve[]: 0 2580 2580 2580 [ 311.342482] Node 0 DMA32 free:747760kB min:36468kB low:45584kB high:54700kB active_anon:1005076kB inactive_anon:9552kB active_file:33048kB inactive_file:49192kB unevictable:0kB writepending:1072kB present:3129332kB managed:2644872kB mlocked:0kB kernel_stack:10784kB pagetables:15760kB bounce:0kB free_pcp:1248kB local_pcp:664kB free_cma:0kB [ 311.373440] lowmem_reserve[]: 0 0 0 0 [ 311.377423] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 311.403228] lowmem_reserve[]: 0 0 0 0 [ 311.407207] Node 1 Normal free:3785740kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 311.436757] lowmem_reserve[]: 0 0 0 0 [ 311.442043] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 311.469262] Node 0 DMA32: 4093*4kB (UME) 2235*8kB (UME) 1635*16kB (UME) 1187*32kB (UM) 526*64kB (UME) 191*128kB (UM) 109*256kB (UME) 62*512kB (UME) 23*1024kB (UM) 3*2048kB (UE) 123*4096kB (UM) = 749660kB [ 311.489650] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 311.501611] Node 1 Normal: 59*4kB (UME) 342*8kB (UE) 277*16kB (UM) 55*32kB (UM) 17*64kB (UM) 8*128kB (U) 8*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785740kB [ 311.519167] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 311.528138] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 311.536997] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 311.546448] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 311.555117] 31435 total pagecache pages [ 311.559090] 0 pages in swap cache [ 311.562655] Swap cache stats: add 0, delete 0, find 0/0 [ 311.568147] Free swap = 0kB [ 311.571398] Total swap = 0kB [ 311.574565] 1965979 pages RAM [ 311.577696] 0 pages HighMem/MovableOnly [ 311.581739] 333233 pages reserved [ 311.585265] 0 pages cma reserved 03:20:50 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:50 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) renameat(r0, &(0x7f00000002c0)='./bus\x00', r0, &(0x7f0000000500)='./file0\x00') 03:20:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:50 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x0, 0x4001f0, 0xffffffff}) recvfrom(0xffffffffffffffff, &(0x7f0000000200)=""/105, 0x69, 0x10100, 0x0, 0x0) getrandom(&(0x7f0000002380)=""/106, 0xfffffffffffffff6, 0x0) 03:20:50 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) 03:20:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x15}, {0x80000006}]}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) [ 313.883506] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 03:20:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:50 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x10) splice(r0, 0x0, r4, 0x0, 0x422000a7b, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='\"\x00\x00\x00!\x00\a', 0x7) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 313.927128] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 313.961307] CPU: 0 PID: 11705 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 313.968392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.977766] Call Trace: [ 313.980368] dump_stack+0x142/0x197 [ 313.984025] warn_alloc.cold+0x96/0x1af [ 313.988033] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 313.992910] ? lock_downgrade+0x740/0x740 [ 313.997074] ? avc_has_perm+0x2df/0x4b0 [ 314.001054] __vmalloc_node_range+0x3c3/0x6a0 [ 314.005540] ? trace_hardirqs_on+0x10/0x10 [ 314.009776] vmalloc+0x46/0x50 [ 314.012973] ? sel_write_load+0x1a0/0x1050 [ 314.017194] sel_write_load+0x1a0/0x1050 [ 314.021265] ? save_trace+0x290/0x290 [ 314.026404] ? sel_read_bool+0x240/0x240 [ 314.030540] ? trace_hardirqs_on+0x10/0x10 [ 314.034791] ? save_trace+0x290/0x290 [ 314.038590] __vfs_write+0x105/0x6b0 [ 314.042422] ? __lock_is_held+0xb6/0x140 [ 314.046492] ? sel_read_bool+0x240/0x240 [ 314.050739] ? kernel_read+0x120/0x120 [ 314.054629] ? __lock_is_held+0xb6/0x140 [ 314.058679] ? check_preemption_disabled+0x3c/0x250 [ 314.063733] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 314.069308] ? rcu_read_lock_sched_held+0x110/0x130 [ 314.074318] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 314.079075] ? __sb_start_write+0x153/0x2f0 [ 314.083383] vfs_write+0x198/0x500 [ 314.086933] SyS_write+0xfd/0x230 [ 314.090428] ? SyS_read+0x230/0x230 [ 314.094050] ? do_syscall_64+0x53/0x640 [ 314.098032] ? SyS_read+0x230/0x230 [ 314.101699] do_syscall_64+0x1e8/0x640 [ 314.105599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.110604] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 314.115786] RIP: 0033:0x45a639 [ 314.118961] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 314.126773] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 314.134046] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 314.141549] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 314.148809] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 [ 314.150136] net_ratelimit: 2 callbacks suppressed [ 314.150141] protocol 88fb is buggy, dev hsr_slave_0 [ 314.156205] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff 03:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 314.173645] protocol 88fb is buggy, dev hsr_slave_1 03:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 314.287511] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 03:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e0200", 0x12) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 314.470110] protocol 88fb is buggy, dev hsr_slave_0 [ 314.475319] protocol 88fb is buggy, dev hsr_slave_1 [ 314.585805] Mem-Info: [ 314.602486] active_anon:254442 inactive_anon:2386 isolated_anon:0 [ 314.602486] active_file:8299 inactive_file:12303 isolated_file:0 [ 314.602486] unevictable:0 dirty:277 writeback:0 unstable:0 [ 314.602486] slab_reclaimable:12539 slab_unreclaimable:107687 [ 314.602486] mapped:59176 shmem:10849 pagetables:4026 bounce:0 [ 314.602486] free:1134301 free_pcp:253 free_cma:0 [ 314.642656] Node 0 active_anon:1019808kB inactive_anon:9544kB active_file:33056kB inactive_file:49212kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236704kB dirty:1104kB writeback:0kB shmem:43396kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 741376kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 314.687926] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 314.724713] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 314.755446] lowmem_reserve[]: 0 2580 2580 2580 [ 314.761645] Node 0 DMA32 free:733392kB min:36468kB low:45584kB high:54700kB active_anon:1019808kB inactive_anon:9544kB active_file:33056kB inactive_file:49212kB unevictable:0kB writepending:1104kB present:3129332kB managed:2644872kB mlocked:0kB kernel_stack:10912kB pagetables:16104kB bounce:0kB free_pcp:1012kB local_pcp:656kB free_cma:0kB [ 314.856291] lowmem_reserve[]: 0 0 0 0 [ 314.865018] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 314.903413] lowmem_reserve[]: 0 0 0 0 [ 314.919141] Node 1 Normal free:3785740kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 314.952424] lowmem_reserve[]: 0 0 0 0 [ 314.956460] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 314.974643] Node 0 DMA32: 4283*4kB (UME) 2248*8kB (UME) 1612*16kB (UME) 1455*32kB (UM) 581*64kB (UME) 195*128kB (UM) 109*256kB (UME) 61*512kB (UME) 24*1024kB (UM) 5*2048kB (UME) 117*4096kB (UM) = 742796kB [ 314.997938] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 315.009097] Node 1 Normal: 59*4kB (UME) 342*8kB (UE) 277*16kB (UM) 55*32kB (UM) 17*64kB (UM) 8*128kB (U) 8*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785740kB [ 315.033290] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 315.045944] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 315.056310] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 315.073557] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 315.083148] 31444 total pagecache pages [ 315.087238] 0 pages in swap cache [ 315.090876] Swap cache stats: add 0, delete 0, find 0/0 [ 315.096447] Free swap = 0kB [ 315.099660] Total swap = 0kB [ 315.102759] 1965979 pages RAM [ 315.105856] 0 pages HighMem/MovableOnly [ 315.109952] 333233 pages reserved [ 315.113970] 0 pages cma reserved 03:20:53 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e0200", 0x12) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:53 executing program 2: clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f00000000c46f000600000007000000"], 0x20) 03:20:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000006b00)={@local, @loopback}, &(0x7f00000073c0)=0xc) 03:20:53 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x10) splice(r0, 0x0, r4, 0x0, 0x422000a7b, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='\"\x00\x00\x00!\x00\a', 0x7) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:20:53 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) 03:20:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e0200", 0x12) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:53 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x905) 03:20:53 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b63c38f19c0408cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c785255f9", @ANYRESHEX=0x0, @ANYRESOCT], 0x0, 0x3b}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 316.955032] SELinux: policydb table sizes (6,7) do not match mine (5,6) [ 316.966589] SELinux: failed to load policy [ 316.975196] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 317.001966] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 317.020502] CPU: 1 PID: 11754 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 317.020596] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 317.028373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.028379] Call Trace: [ 317.028402] dump_stack+0x142/0x197 [ 317.028418] warn_alloc.cold+0x96/0x1af [ 317.028430] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 317.028443] ? lock_downgrade+0x740/0x740 [ 317.028458] ? avc_has_perm+0x2df/0x4b0 [ 317.069830] __vmalloc_node_range+0x3c3/0x6a0 [ 317.074351] vmalloc+0x46/0x50 [ 317.077555] ? sel_write_load+0x1a0/0x1050 [ 317.081810] sel_write_load+0x1a0/0x1050 [ 317.085900] ? save_trace+0x290/0x290 [ 317.089724] ? sel_read_bool+0x240/0x240 [ 317.093809] ? trace_hardirqs_on+0x10/0x10 [ 317.098064] ? save_trace+0x290/0x290 [ 317.101884] __vfs_write+0x105/0x6b0 [ 317.105613] ? __lock_is_held+0xb6/0x140 [ 317.109689] ? sel_read_bool+0x240/0x240 [ 317.113766] ? kernel_read+0x120/0x120 [ 317.117668] ? __lock_is_held+0xb6/0x140 [ 317.121741] ? check_preemption_disabled+0x3c/0x250 [ 317.126774] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 317.132238] ? rcu_read_lock_sched_held+0x110/0x130 [ 317.137286] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 317.142072] ? __sb_start_write+0x153/0x2f0 [ 317.146415] vfs_write+0x198/0x500 [ 317.150089] SyS_write+0xfd/0x230 [ 317.153579] ? SyS_read+0x230/0x230 [ 317.157418] ? do_syscall_64+0x53/0x640 [ 317.161506] ? SyS_read+0x230/0x230 [ 317.165193] do_syscall_64+0x1e8/0x640 [ 317.169094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.173961] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 317.179288] RIP: 0033:0x45a639 [ 317.182493] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 317.190465] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 317.197761] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 03:20:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba10", 0x1b) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 317.205053] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 317.212336] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 [ 317.219632] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff [ 317.248041] Mem-Info: [ 317.251050] active_anon:252923 inactive_anon:2386 isolated_anon:0 [ 317.251050] active_file:8301 inactive_file:12313 isolated_file:0 [ 317.251050] unevictable:0 dirty:290 writeback:0 unstable:0 [ 317.251050] slab_reclaimable:12518 slab_unreclaimable:110046 [ 317.251050] mapped:59176 shmem:10849 pagetables:4096 bounce:0 [ 317.251050] free:1133327 free_pcp:233 free_cma:0 [ 317.287812] Node 0 active_anon:1018076kB inactive_anon:9544kB active_file:33064kB inactive_file:49252kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236704kB dirty:1156kB writeback:0kB shmem:43396kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 741376kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 03:20:54 executing program 3: pipe2(&(0x7f0000000140), 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000000440)=[{0x0}, {0x0}, {0x0}, {0x0, 0x31}, {&(0x7f0000000400)=""/28, 0x1c}], 0x5}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket(0x100000800000011, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) fcntl$dupfd(r1, 0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/igmp6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) mkdir(&(0x7f0000000640)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x100000800000011, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4034ccdbf2bb01402120148d0f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) 03:20:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000010c0)='net/tcp6\x00') read$FUSE(r1, 0x0, 0x9a) read$FUSE(r1, &(0x7f0000001100), 0x11e5) [ 317.325188] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 317.399214] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 317.426031] lowmem_reserve[]: 0 2580 2580 2580 [ 317.431384] ptrace attach of "/root/syz-executor.3"[11779] was attempted by "/root/syz-executor.3"[11781] [ 317.442024] Node 0 DMA32 free:723640kB min:36468kB low:45584kB high:54700kB active_anon:1015980kB inactive_anon:9544kB active_file:33064kB inactive_file:49252kB unevictable:0kB writepending:1156kB present:3129332kB managed:2644872kB mlocked:0kB kernel_stack:10976kB pagetables:16384kB bounce:0kB free_pcp:1212kB local_pcp:640kB free_cma:0kB [ 317.475125] lowmem_reserve[]: 0 0 0 0 [ 317.481104] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 317.516963] lowmem_reserve[]: 0 0 0 0 [ 317.521072] Node 1 Normal free:3785740kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 317.559192] lowmem_reserve[]: 0 0 0 0 [ 317.563286] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 317.581655] Node 0 DMA32: 4281*4kB (UME) 2399*8kB (UME) 1607*16kB (ME) 1333*32kB (M) 577*64kB (UME) 122*128kB (UM) 109*256kB (UME) 61*512kB (UME) 24*1024kB (UM) 4*2048kB (UME) 116*4096kB (UM) = 724268kB [ 317.607207] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 317.618653] Node 1 Normal: 59*4kB (UME) 342*8kB (UE) 277*16kB (UM) 55*32kB (UM) 17*64kB (UM) 8*128kB (U) 8*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785740kB [ 317.640376] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 317.649361] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 317.662991] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 317.673437] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 317.685821] 31450 total pagecache pages [ 317.689865] 0 pages in swap cache [ 317.694311] Swap cache stats: add 0, delete 0, find 0/0 [ 317.699702] Free swap = 0kB [ 317.706424] Total swap = 0kB [ 317.709495] 1965979 pages RAM [ 317.713489] 0 pages HighMem/MovableOnly [ 317.717501] 333233 pages reserved [ 317.724855] 0 pages cma reserved 03:20:56 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba10", 0x1b) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:56 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) tkill(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, 0x0, &(0x7f0000000100)) 03:20:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r3, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x2200cf7d, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x7843c471) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) close(r5) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xf642e7e) recvmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1fa0}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 03:20:56 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) 03:20:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000740)=0x182, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) [ 319.964292] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 319.996847] syz-executor.4 cpuset=syz4 mems_allowed=0-1 [ 320.012279] CPU: 0 PID: 11791 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 320.019366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.028736] Call Trace: [ 320.031344] dump_stack+0x142/0x197 [ 320.034989] warn_alloc.cold+0x96/0x1af [ 320.035003] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 320.043837] ? lock_downgrade+0x740/0x740 [ 320.047997] ? avc_has_perm+0x2df/0x4b0 [ 320.051988] __vmalloc_node_range+0x3c3/0x6a0 [ 320.052004] ? trace_hardirqs_on+0x10/0x10 [ 320.060728] vmalloc+0x46/0x50 [ 320.060739] ? sel_write_load+0x1a0/0x1050 [ 320.060746] sel_write_load+0x1a0/0x1050 [ 320.060757] ? save_trace+0x290/0x290 [ 320.060769] ? sel_read_bool+0x240/0x240 [ 320.060780] ? trace_hardirqs_on+0x10/0x10 [ 320.060788] ? save_trace+0x290/0x290 [ 320.060801] __vfs_write+0x105/0x6b0 [ 320.060810] ? __lock_is_held+0xb6/0x140 [ 320.060817] ? sel_read_bool+0x240/0x240 [ 320.060827] ? kernel_read+0x120/0x120 [ 320.060834] ? __lock_is_held+0xb6/0x140 [ 320.060842] ? check_preemption_disabled+0x3c/0x250 [ 320.060856] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 320.076120] ? rcu_read_lock_sched_held+0x110/0x130 [ 320.076131] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 320.076145] ? __sb_start_write+0x153/0x2f0 [ 320.100053] vfs_write+0x198/0x500 [ 320.100068] SyS_write+0xfd/0x230 [ 320.100079] ? SyS_read+0x230/0x230 [ 320.100090] ? do_syscall_64+0x53/0x640 [ 320.100101] ? SyS_read+0x230/0x230 [ 320.100122] do_syscall_64+0x1e8/0x640 [ 320.100132] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:20:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba10", 0x1b) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 320.100149] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 320.100161] RIP: 0033:0x45a639 [ 320.123578] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 320.123590] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 320.123595] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 320.123599] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 320.123604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 [ 320.123608] R13: 00000000004cb07b R14: 00000000004e35c0 R15: 00000000ffffffff 03:20:57 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) dup2(r1, r2) [ 320.152803] Mem-Info: [ 320.176001] active_anon:255575 inactive_anon:2388 isolated_anon:0 [ 320.176001] active_file:8304 inactive_file:12598 isolated_file:0 [ 320.176001] unevictable:0 dirty:541 writeback:0 unstable:0 [ 320.176001] slab_reclaimable:12481 slab_unreclaimable:111781 [ 320.176001] mapped:59176 shmem:10849 pagetables:4130 bounce:0 [ 320.176001] free:1128730 free_pcp:128 free_cma:0 03:20:57 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x108200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) lseek(r2, 0x0, 0x3) [ 320.341451] audit: type=1804 audit(1574133657.135:126): pid=11813 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=16897 res=1 03:20:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 320.379509] Node 0 active_anon:1022288kB inactive_anon:9552kB active_file:33076kB inactive_file:57592kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236704kB dirty:8860kB writeback:0kB shmem:43396kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 749568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 320.390133] protocol 88fb is buggy, dev hsr_slave_0 [ 320.416761] protocol 88fb is buggy, dev hsr_slave_1 03:20:57 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) fsetxattr(r1, &(0x7f00000000c0)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0xffef, 0x0) 03:20:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 320.490889] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 320.580275] Node 0 DMA free:15908kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 320.672895] lowmem_reserve[]: 0 2580 2580 2580 [ 320.678272] Node 0 DMA32 free:702232kB min:36468kB low:45584kB high:54700kB active_anon:1018064kB inactive_anon:9552kB active_file:33076kB inactive_file:64792kB unevictable:0kB writepending:16500kB present:3129332kB managed:2644872kB mlocked:0kB kernel_stack:11040kB pagetables:16372kB bounce:0kB free_pcp:1068kB local_pcp:436kB free_cma:0kB [ 320.709310] lowmem_reserve[]: 0 0 0 0 [ 320.718052] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 320.743699] lowmem_reserve[]: 0 0 0 0 [ 320.747563] Node 1 Normal free:3785740kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 320.775743] lowmem_reserve[]: 0 0 0 0 [ 320.779564] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 320.793535] Node 0 DMA32: 2853*4kB (UME) 1450*8kB (UME) 1812*16kB (UME) 1340*32kB (UM) 576*64kB (ME) 94*128kB (UM) 96*256kB (UME) 61*512kB (UME) 24*1024kB (UM) 5*2048kB (UME) 115*4096kB (UM) = 705444kB [ 320.812562] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 320.823417] Node 1 Normal: 59*4kB (UME) 342*8kB (UE) 277*16kB (UM) 55*32kB (UM) 17*64kB (UM) 8*128kB (U) 8*256kB (UME) 2*512kB (UE) 3*1024kB (UME) 4*2048kB (ME) 918*4096kB (M) = 3785740kB [ 320.840427] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 320.849484] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 320.858295] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 320.867378] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 320.876938] 33118 total pagecache pages [ 320.881041] 0 pages in swap cache [ 320.884513] Swap cache stats: add 0, delete 0, find 0/0 [ 320.889886] Free swap = 0kB [ 320.892996] Total swap = 0kB [ 320.896016] 1965979 pages RAM [ 320.899133] 0 pages HighMem/MovableOnly [ 320.903215] 333233 pages reserved [ 320.906681] 0 pages cma reserved 03:20:59 executing program 3: rt_sigprocmask(0xd2571b671d6b88cc, &(0x7f00000000c0), 0x0, 0x8) 03:20:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba108008000200", 0x20) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:20:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0xd, &(0x7f0000000180), 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) wait4(0x0, 0x0, 0x0, 0x0) 03:20:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x1}, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 03:20:59 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:20:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d979"], 0x16) [ 323.029526] SELinux: failed to load policy 03:20:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f19", 0x22) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 323.128033] ptrace attach of "/root/syz-executor.1"[11847] was attempted by "/root/syz-executor.1"[11848] 03:21:00 executing program 3: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000580)) syz_open_procfs(0x0, &(0x7f0000000300)='net/igmp6\x00') 03:21:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d979"], 0x16) 03:21:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f19", 0x22) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 323.190140] protocol 88fb is buggy, dev hsr_slave_0 [ 323.195323] protocol 88fb is buggy, dev hsr_slave_1 [ 323.234461] SELinux: failed to load policy 03:21:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d979"], 0x16) 03:21:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f19", 0x22) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:21:00 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fstat(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) syslog(0x0, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r2, r2, &(0x7f0000000180)=0x74000000, 0x5) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) 03:21:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb314d", 0x29) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xe) fcntl$setstatus(r0, 0x4, 0x80000000002400) [ 323.359846] SELinux: failed to load policy [ 323.467132] audit: type=1400 audit(1574133660.255:127): avc: denied { syslog } for pid=11864 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 323.500844] ptrace attach of "/root/syz-executor.1"[11877] was attempted by "/root/syz-executor.1"[11878] 03:21:02 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(0x0, 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196b", 0x23) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) 03:21:02 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040"], 0x21) 03:21:02 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'syz0\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xde\xff\x00', &(0x7f0000000480)=""/195, 0xc3}, 0x120) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r1, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'syz0\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xde\xff\x00', &(0x7f0000000480)=""/195, 0xc3}, 0x120) dup2(r0, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 03:21:02 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$apparmor_exec(r3, &(0x7f0000000000)={'exec ', 'sit\x00'}, 0x9) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x28, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @remote}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8}], @tunl_policy=[@IFLA_IPTUN_TTL={0x8, 0x4, 0x1}]]}}}]}, 0x54}}, 0x0) 03:21:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) socket(0x0, 0x0, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f00000017c0)='./file1\x00', 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = gettid() tkill(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000006980)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000069c0)='net/tcp6\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0xc) [ 326.083362] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.099243] SELinux: failed to load policy [ 326.103755] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.103786] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.103800] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.103813] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:21:02 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040"], 0x21) [ 326.103826] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.103845] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.103858] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.103871] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.103883] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.103895] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.103908] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:21:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040"], 0x21) 03:21:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196b", 0x23) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 326.103921] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.124934] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.205185] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 326.211001] SELinux: failed to load policy [ 326.226281] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:21:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 326.248642] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.282574] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:21:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196b", 0x23) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 326.300593] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.312863] SELinux: failed to load policy [ 326.320989] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:21:03 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f00000001c0)=0xc) keyctl$chown(0x4, r0, r1, 0x0) getgroups(0x1, &(0x7f0000000080)=[0xee01]) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r1, r2, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x200000, 0x0) write$P9_RFSYNC(r3, &(0x7f0000000140)={0x7}, 0x7) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000200)=0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000280)=ANY=[@ANYRES32=r4]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0}) [ 326.323508] audit: type=1400 audit(1574133663.115:128): avc: denied { map } for pid=11909 comm="syz-executor.3" path="socket:[43130]" dev="sockfs" ino=43130 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 [ 326.339249] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.386062] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.409276] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.416508] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.424303] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.437061] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.455814] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.469528] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.476401] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.483217] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.489892] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.496651] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.503787] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.510593] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.517294] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.524031] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.530877] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.537580] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.544575] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.551352] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.558048] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.564814] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.572324] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.579373] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.586163] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.592944] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.599658] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.606411] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.613327] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.620200] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.626897] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.630129] protocol 88fb is buggy, dev hsr_slave_0 [ 326.633648] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.638659] protocol 88fb is buggy, dev hsr_slave_1 [ 326.645307] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.657001] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.664114] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.671010] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.677691] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.684416] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.691164] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.697863] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.704638] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.711964] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.718742] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.725612] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.732371] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.739062] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.745824] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.752567] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.759318] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.766210] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.772970] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.779784] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.786539] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.793286] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.799962] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.806705] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.813424] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.821167] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.828026] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.834785] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.841559] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.848233] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.854961] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.861682] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.868352] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.875103] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.881826] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.888618] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.895364] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.902093] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.908882] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.915759] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.922513] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.929185] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.936206] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.942943] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.949633] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.956603] protocol 88fb is buggy, dev hsr_slave_0 [ 326.956649] protocol 88fb is buggy, dev hsr_slave_1 [ 326.967040] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.973817] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.980567] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.987280] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 326.994034] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.000764] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.007448] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.014213] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.021079] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.027756] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.034507] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.041287] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.047967] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.054738] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:21:03 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(0x0, 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:03 executing program 3: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000240)}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0, 0x14c}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:21:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 327.061715] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.068429] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.075637] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.082405] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.089121] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.095876] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.108375] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.115314] protocol 88fb is buggy, dev hsr_slave_0 [ 327.115367] protocol 88fb is buggy, dev hsr_slave_1 [ 327.129974] ptrace attach of "/root/syz-executor.3"[11934] was attempted by "/root/syz-executor.3"[11936] [ 327.137870] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.146693] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.153599] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.167104] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.174157] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.181123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.181138] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.181152] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.201417] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.208125] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.215104] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.221979] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.228841] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.236080] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.243171] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.249858] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.256625] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.263551] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.270481] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.277182] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.283940] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.290702] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.297609] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.304391] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.311128] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.318036] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.324814] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.331558] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.338239] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.345062] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.351880] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.358560] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.360152] protocol 88fb is buggy, dev hsr_slave_0 [ 327.365469] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.370504] protocol 88fb is buggy, dev hsr_slave_1 [ 327.377179] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.388949] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.395972] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.402693] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.409360] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.416607] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.423355] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.430195] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.436881] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.443604] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.450532] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.457224] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.464093] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.470841] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.477625] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.484382] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.491115] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.497793] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.504576] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.511309] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.517986] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.524724] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.531486] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.538187] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.544912] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.551623] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.558301] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.565030] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.571877] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.578625] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.585369] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.592091] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.598908] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.605692] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.612695] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.619421] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.626302] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.633505] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.640820] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.647517] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.654250] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.660962] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 03:21:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f0000000100)=@ethtool_rxfh={0x46, 0x0, 0x0, 0x0, 0x0, '\x00\x00 '}}) 03:21:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000"], 0x27) 03:21:04 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newae={0x40, 0x1e, 0x1, 0x0, 0x0, {{@in6=@empty}, @in=@loopback}}, 0x40}}, 0x0) 03:21:04 executing program 3: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000140)=0x100) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) splice(r1, 0x0, r0, 0x0, 0x11001, 0x0) 03:21:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 327.667654] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.674408] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.681151] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 327.690447] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 03:21:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000"], 0x27) [ 327.739439] SELinux: failed to load policy 03:21:04 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) setns(r0, 0x2040000) fchdir(r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000800)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x5, 0x68, 0x7ff}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40040}, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000380)='/prxec\x00', 0x2, 0x0) r4 = open(&(0x7f0000000480)='./bus\x00', 0x141046, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00E8\xddV\x82li\x1d/y6\xa2\xea\xff7\xcaz\xb1\x04\xa5\x14[\x1d+5B\\q.\x11\x91Y\xe0\xcb\xc5.$\x13h\xac\x89\xca\x86\x11\x03\x1c\x9d\x06KB\x05,\x84>\x84i\x10\x96\xf1BC\xb31\x7f\x96\x7f\x82\"2\x00\x00\x00\x00\x00') socket(0x2, 0x2, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x101}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000940)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000300)=ANY=[]) sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000740)={0x0, 0xfffffffffffffd87, &(0x7f0000000700)={&(0x7f0000000540)=ANY=[@ANYBLOB="64001f5f7366a76c0000", @ANYRES16, @ANYBLOB="10002cbd7000fcdbdf2515000000440009080800020000000000080001000000000008000200e55d0000080002009104000008000200a800000008000100f7ffffff08000200980e000008000200040000000c00060008000100090000ffc2ac1490be9197db688dfbdc4ca526c241932f2c30fc10233b32ec2696651487e0045ef385"], 0x3}, 0x1, 0x0, 0x0, 0x2200402a}, 0x24000894) sched_setparam(0x0, &(0x7f0000000500)=0xfffd) stat(0x0, &(0x7f0000000780)) r6 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, 0x0, &(0x7f0000000100)) r7 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f00000003c0)={0x50, 0xfffffffffffffffe, 0x1, {0x7, 0x1f, 0x0, 0x0, 0x1a27, 0x0, 0x0, 0x4}}, 0x50) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$TIOCGSID(r7, 0x5429, 0x0) gettid() 03:21:04 executing program 1: clone(0x203102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x0, 0x400, 0x0, 0xaf2, 0x4}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xd, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 03:21:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x22, &(0x7f0000000200)={@local, @empty}, 0xc) [ 327.831388] SELinux: failed to load policy 03:21:04 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(0x0, 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000"], 0x27) 03:21:04 executing program 2: socket$inet6(0x10, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x11) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = syz_open_procfs(0x0, &(0x7f00000010c0)='net/tcp6\x00') read$FUSE(r2, &(0x7f0000000000), 0x1170) write$FUSE_NOTIFY_POLL(r2, 0x0, 0x15) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0x0, 0x2, 0xfffffffffffffffb, 0x6}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000100)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') dup3(0xffffffffffffffff, r4, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00\x00\x00v\x98\x91bS\xb3\x81\x99\x00', 0xb00}) ioctl$TUNSETLINK(r5, 0x400454cd, 0x30a) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001480)={{{@in=@empty, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000fc0)=0x91) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001000)='pids.events\x00', 0x275a, 0x0) ptrace(0x10, r3) wait4(r3, 0x0, 0x2, 0x0) 03:21:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x800000000004, 0x4, 0x9}, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f00000000c0), 0x6}, 0x20) 03:21:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000200)={@local, @empty}, 0xc) 03:21:04 executing program 3: r0 = socket(0x100000000010, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@ipv6_delroute={0x1c, 0x19, 0x205, 0x0, 0x0, {0xa, 0x10}}, 0x1c}}, 0x0) 03:21:04 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x8031, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) 03:21:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000"], 0x2a) 03:21:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000200)={@local, @empty}, 0xc) [ 328.171312] SELinux: failed to load policy 03:21:05 executing program 1: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040), 0xffffffffffffff5f}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x0, 0x108}, 0x20) tkill(r0, 0x3b) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:21:05 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000"], 0x2a) [ 328.278597] SELinux: failed to load policy 03:21:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000200)={@local, @empty}, 0xc) [ 328.344567] ptrace attach of "/root/syz-executor.1"[12002] was attempted by "/root/syz-executor.1"[12005] [ 328.386491] SELinux: failed to load policy [ 328.456430] ptrace attach of "/root/syz-executor.2"[12001] was attempted by "/root/syz-executor.2"[12003] [ 328.482534] IPVS: ftp: loaded support on port[0] = 21 [ 328.548345] ptrace attach of "/root/syz-executor.2"[12003] was attempted by "/root/syz-executor.2"[12020] [ 328.710123] protocol 88fb is buggy, dev hsr_slave_0 [ 328.715289] protocol 88fb is buggy, dev hsr_slave_1 03:21:07 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r0, 0x80044584, &(0x7f00000011c0)=""/4096) 03:21:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, 0x0, 0x0) 03:21:07 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000"], 0x2a) 03:21:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000180)=""/237, 0xed}], 0x1, 0x0) 03:21:07 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ftruncate(r3, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 03:21:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653f0d89abf4d209bc876003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc158bb2b03b5b2461179f5f90bba00", 0x61}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:21:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, 0x0, 0x0) [ 331.276564] SELinux: failed to load policy 03:21:08 executing program 1: r0 = getpgid(0x0) ptrace$setopts(0x4206, r0, 0x80000001, 0x0) 03:21:08 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ff"], 0x2b) 03:21:08 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') 03:21:08 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r1, 0x0, 0x22, 0x0, 0x0) 03:21:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0xfdf4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9dba}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) wait4(0x0, 0x0, 0x0, 0x0) [ 331.474914] SELinux: failed to load policy 03:21:08 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ff"], 0x2b) 03:21:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000005200190f00003fffffffda060200000000e80001040000040d000a00ea1100000005000000", 0x29}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r3}]]}}}]}, 0x38}}, 0x0) recvmmsg(r0, &(0x7f0000007c80), 0x400000000000046, 0x2, 0x0) 03:21:08 executing program 2: r0 = socket(0x11, 0x800000003, 0x81) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000002340)={{}, "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", [[], [], [], []]}, 0xff0) 03:21:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x86350900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:21:08 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff8200040000000000000000000ff"], 0x2b) [ 331.639684] SELinux: failed to load policy 03:21:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@polexpire={0xc0, 0x1b, 0x1, 0x0, 0x0, {{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}}}, 0xc0}, 0x8}, 0x0) 03:21:08 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)) 03:21:08 executing program 4: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) r1 = socket$netlink(0x10, 0x3, 0xd) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss, @sack_perm, @mss, @window, @sack_perm], 0x20000000000001f4) sendto$inet(r0, &(0x7f0000000580)='\x00', 0x1, 0x20000084, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x4, 0x7ffffffc}, 0x14) shutdown(r0, 0x2) [ 331.724886] ptrace attach of "/root/syz-executor.1"[12085] was attempted by "/root/syz-executor.1"[12087] [ 331.739888] SELinux: failed to load policy 03:21:08 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x3f) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x5, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES64=r0], 0x18}, 0x0) close(r0) connect$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 03:21:08 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:08 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000500)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 03:21:08 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 03:21:08 executing program 5: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6990800004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 03:21:08 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x100000198) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 03:21:08 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000400)={0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x541b, &(0x7f0000000000)) openat$cgroup_ro(r1, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) 03:21:08 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="640000002400010f00"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$update(0x2, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f00000006c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes256, 0x0, "8435bab554689331"}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'dh\x00'}, 0x2c) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) 03:21:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000140)=0xb3) r3 = syz_open_pts(r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000000)) [ 332.173639] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 332.234537] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:21:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x3) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)) [ 332.283330] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 332.293674] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 03:21:09 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8932, &(0x7f0000000140)='sit0\x00') 03:21:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000000301ffff808fc201000000000000101b"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) 03:21:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000004900)=0xfffffffffffffff9) close(r1) [ 332.870190] net_ratelimit: 14 callbacks suppressed [ 332.870199] protocol 88fb is buggy, dev hsr_slave_0 [ 332.880525] protocol 88fb is buggy, dev hsr_slave_1 03:21:09 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(0x0, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x400000005) read(r0, &(0x7f0000001300)=""/11, 0x8) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCFLSH(r2, 0x540a, 0x2) 03:21:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0xb4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000000c0)=ANY=[@ANYBLOB="1354f3c1000000000a00000000000000ff020000000000000001000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000b30000000000000100000000000000"], 0x90) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 03:21:09 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) listen(r0, 0x0) 03:21:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) utimes(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000540)={{}, {0x77359400}}) 03:21:09 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) eventfd2(0x0, 0x0) eventfd2(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/186, 0x50}, 0x120) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xb5}], 0x8) 03:21:09 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x44, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000000058000000000000001800000000000000", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYBLOB="852a627300633bf6c8b9de6cb10000000000000000000000852a7470000000000000000000000000000000000000000000000000000000000000000000000000852a6273"], @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000180000000000000040"]], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x4c, 0x0, &(0x7f0000000280)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000380)={@flat=@binder={0x73622a85, 0x0, 0x1}, @ptr={0x70742a85, 0x0, 0xfffffffffffffffd}, @fd}, &(0x7f0000000440)={0x0, 0x18, 0x40}}}], 0x0, 0x0, 0x0}) 03:21:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xfffffffffffffe7b, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad20780648c6394fb0400fc0010000b400c000200053582c137153e370900018025081700d1bd", 0x2e}], 0x1}, 0x0) [ 333.108231] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 03:21:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x4, 0x0) r2 = creat(&(0x7f0000000480)='./bus\x00', 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 03:21:10 executing program 1: creat(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:mount_exec_t:s0\x00', 0x9, 0x0) [ 333.151861] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.162659] ptrace attach of "/root/syz-executor.4"[12187] was attempted by "/root/syz-executor.4"[12192] [ 333.190140] protocol 88fb is buggy, dev hsr_slave_0 [ 333.195307] protocol 88fb is buggy, dev hsr_slave_1 03:21:10 executing program 3: r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)="e04a4f74b80de1fa", 0x8}], 0x1) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="5e87e905b394af7e", 0x8}], 0x1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast1}}) timer_settime(0x0, 0x0, &(0x7f0000001040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r1 = gettid() tkill(r1, 0x15) [ 333.225627] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.252744] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 03:21:10 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[], 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x9967b63d9c1f7236, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000080)) bind$ax25(r0, &(0x7f0000000000)={{0x3, @bcast}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'nr0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="45000000080000120500000006000000857400003db000007c050000200000000004f4ff0100"]}) unshare(0x40000000) [ 333.278544] audit: type=1400 audit(1574133670.065:129): avc: denied { mac_admin } for pid=12201 comm="syz-executor.1" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 333.281232] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.308178] SELinux: Context system_u: is not valid (left unmapped). [ 333.360114] protocol 88fb is buggy, dev hsr_slave_0 [ 333.365572] protocol 88fb is buggy, dev hsr_slave_1 [ 333.405515] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.418767] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.431553] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.438783] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.446499] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.454835] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.461991] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.468720] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.475600] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.482581] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.489715] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.496490] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.503419] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.510180] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.517190] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.523932] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.530691] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.537930] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.545076] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.552229] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.559367] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.566441] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.573460] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.580386] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.587559] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.590221] protocol 88fb is buggy, dev hsr_slave_0 [ 333.594563] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.599657] protocol 88fb is buggy, dev hsr_slave_1 [ 333.606517] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.618539] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.625461] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.632761] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.639578] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.646556] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.653323] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.660461] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.667160] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.674159] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.681221] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.688115] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.695293] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.702834] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.710256] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.717656] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.725076] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.726842] IPVS: ftp: loaded support on port[0] = 21 [ 333.731995] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732010] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732022] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732036] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732049] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732061] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732075] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732087] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732100] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732112] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732125] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732138] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732151] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732164] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732176] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.732188] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.851639] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.858995] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.866032] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.872973] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.880178] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.886899] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.893822] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.901318] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.908013] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.915329] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.922264] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.929071] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.936049] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.942986] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.949705] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.956769] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 333.965640] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 [ 333.984814] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 333.992470] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 333.999502] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.006610] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.013898] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021207] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021221] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021234] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021246] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021259] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021272] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021285] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021297] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021310] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021322] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021335] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021347] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021360] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021373] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021385] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021403] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021415] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021427] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021440] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021452] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021464] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021477] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021490] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021502] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021515] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021528] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021544] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021556] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021569] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021580] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021590] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021602] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 03:21:11 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(0x0, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) 03:21:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:21:11 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8931, &(0x7f0000000140)='sit0\x00') [ 334.021612] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.021623] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.042726] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.056959] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.074466] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.088176] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.102515] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.116487] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 03:21:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback={0x100000000000000}}]}, 0x2c}}, 0x0) [ 334.140285] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.159310] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.173179] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.190412] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.266177] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.296668] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 334.317394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.338570] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.358038] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 334.358479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 334.366148] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.386233] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.393720] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.404860] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.412770] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.412786] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.412799] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.412935] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.412948] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.412960] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.412972] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.412985] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.412998] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413011] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413141] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413155] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413168] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413182] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413196] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413209] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413222] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413235] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413248] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413261] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413274] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 03:21:11 executing program 2: socket$unix(0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) clone(0x2102801ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x102, 0x9032, 0xffffffffffffffff, 0x0) 03:21:11 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6e7400000100ce156385b1080fb8c86310f90900563039e4444d7a646fca63c33cb775870020002bed400005000000c75e56d9489a9879000000001018039cdd09f00000ac01000000003f49590000000000fece"], 0x1) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 03:21:11 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 334.413293] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413464] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.413477] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 334.484437] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 03:21:11 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(0x0, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) [ 334.685529] ptrace attach of "/root/syz-executor.4"[12240] was attempted by "/root/syz-executor.4"[12245] 03:21:11 executing program 1: pipe(&(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) gettid() sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:21:11 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() r4 = socket$key(0xf, 0x3, 0x2) read(r4, &(0x7f0000000040)=""/3, 0x3) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x39) 03:21:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28, 0x10, &(0x7f0000000000), 0xfeb6}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 334.892786] ptrace attach of "/root/syz-executor.5"[12259] was attempted by "/root/syz-executor.5"[12262] 03:21:11 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="1f000000020319", 0x7}], 0x1) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:21:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv4_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_MULTIPATH={0xc, 0x8, {0x8, 0x8}}]}, 0x28}}, 0x0) [ 334.950120] protocol 88fb is buggy, dev hsr_slave_0 [ 334.955275] protocol 88fb is buggy, dev hsr_slave_1 03:21:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="640000002400010b0800"/20, @ANYRES32=r1, @ANYBLOB="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"], 0x64}}, 0x0) 03:21:11 executing program 2: [ 335.097106] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.5'. [ 335.117416] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:21:11 executing program 2: 03:21:11 executing program 4: [ 335.139336] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:21:12 executing program 2: 03:21:12 executing program 3: 03:21:12 executing program 4: 03:21:12 executing program 1: 03:21:12 executing program 2: 03:21:12 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:12 executing program 5: 03:21:12 executing program 3: 03:21:12 executing program 4: 03:21:12 executing program 1: 03:21:12 executing program 2: 03:21:12 executing program 3: 03:21:12 executing program 4: 03:21:12 executing program 1: 03:21:12 executing program 2: 03:21:12 executing program 5: 03:21:12 executing program 3: 03:21:13 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:13 executing program 4: 03:21:13 executing program 2: 03:21:13 executing program 5: 03:21:13 executing program 1: 03:21:13 executing program 3: 03:21:13 executing program 4: 03:21:13 executing program 5: 03:21:13 executing program 3: 03:21:13 executing program 1: 03:21:13 executing program 2: 03:21:13 executing program 5: 03:21:14 executing program 1: 03:21:14 executing program 4: 03:21:14 executing program 3: 03:21:14 executing program 2: 03:21:14 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:14 executing program 5: 03:21:14 executing program 2: 03:21:14 executing program 5: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x8}) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000740)={@mcast2, 0x5f, r2}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) sendfile(r3, r3, &(0x7f0000000240), 0x2008000fffffffe) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, 0x0) ptrace(0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)='ramfs\x00') ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x2, 0x0, 0x5, 0x0, 0x80, 0xb093}) socketpair(0x1, 0x0, 0x0, 0x0) r4 = creat(0x0, 0x0) dup(r4) ppoll(&(0x7f00000000c0)=[{r1, 0x70d4}], 0x1, 0x0, &(0x7f00000002c0), 0x8) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000004c0)=0xb59) 03:21:14 executing program 4: 03:21:14 executing program 1: 03:21:14 executing program 3: 03:21:14 executing program 2: 03:21:14 executing program 3: 03:21:14 executing program 1: 03:21:14 executing program 2: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 03:21:14 executing program 4: 03:21:15 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:15 executing program 3: 03:21:15 executing program 4: 03:21:15 executing program 5: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) pipe(&(0x7f00000006c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000040)=@ipx, 0x3f7, &(0x7f0000000440)=[{0x0, 0xffffffffffffff5d}, {0x0}, {0x0}, {0x0, 0xa7}, {&(0x7f0000000400)=""/17, 0x85}], 0x5}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6(0x10, 0x8000000100000003, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001980)=ANY=[@ANYBLOB="4034ccdbf2bbfb3f2120148d0f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r4}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 03:21:15 executing program 1: 03:21:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="24000000120007031dfffd946fa2830012000a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000100)='/selinux/avc/cache_stats\x00'}, 0x30) 03:21:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:21:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000100), 0x4) sendmmsg(r2, &(0x7f000000ac80), 0x66, 0x0) 03:21:15 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="0c00cd80"], 0x4}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea942494855d4bd3388b68af3", @ANYPTR64, @ANYRESHEX=0x0, @ANYRESOCT, @ANYBLOB="e6c55c5dbf03a4dc0a9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4f9ad03000000dfdaf3d0fef215586de3c101", @ANYRESDEC], 0x0, 0x16d}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 338.510354] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 338.530872] audit: type=1400 audit(1574133675.315:130): avc: denied { dyntransition } for pid=12398 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 03:21:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x800) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000600)=0x7fffffff, 0x4) bind$netlink(r0, &(0x7f0000000840)={0x10, 0x0, 0x25dfdbff, 0x2200000}, 0xfffffffffffffc8f) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$notify(r0, 0x402, 0x1a) write(r2, &(0x7f0000000640)="05662605063c6fe4cecccc84e4432330513a104c0cd71508ecbe38b0f6ae54", 0x1f) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000740)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000800)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x7c42040f857d31e5}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x2c, r5, 0x8, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20}, 0x4c) r6 = syz_open_procfs(0x0, &(0x7f0000000580)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a\xc9n;v<\xd6h\xb0\x15\xaf;x\xb5;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK(\x0f\xadG\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x3}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0x3, 0x4, 0x3}, &(0x7f00000001c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r9, r7, 0x0, 0x4, &(0x7f0000000000)='em1\x00', r10}, 0x30) clone(0x40020000, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff}) read(r11, &(0x7f0000000200)=""/250, 0x50c7e3e3) r12 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r12, 0x7003) read$FUSE(r12, &(0x7f0000001100), 0x1000) 03:21:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0xc340dfd19c177503, &(0x7f0000000440)) 03:21:15 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) fchdir(r0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000380)="8828") ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x1ff, 0x6, 0x13, 0x0, 0x9, 0x7, 0x2, 0x6}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000100)) readahead(0xffffffffffffffff, 0x7f, 0x210a) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000340)='threaded\x00', 0xffffffc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x36, 0x0, 0x0) [ 338.575292] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 338.592501] ptrace attach of "/root/syz-executor.1"[12404] was attempted by "/root/syz-executor.1"[12406] 03:21:15 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pread64(r0, &(0x7f0000000140)=""/75, 0x4b, 0x0) [ 338.755793] audit: type=1400 audit(1574133675.545:131): avc: denied { dyntransition } for pid=12398 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 03:21:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f00000020c0)=""/4096, &(0x7f0000000100)=0x1000) [ 338.845994] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 338.854839] IPVS: ftp: loaded support on port[0] = 21 [ 338.894990] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 338.904261] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:21:15 executing program 5: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000040)="240000003a00d17da53a7436fef7001d0a0b49ffed000009000028000800030001000000", 0x24) recvmmsg(r0, &(0x7f00000035c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 338.956048] ptrace attach of "/root/syz-executor.5"[12436] was attempted by "/root/syz-executor.5"[12437] [ 338.980471] net_ratelimit: 14 callbacks suppressed [ 338.980478] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:21:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x15}]}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x35) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 03:21:15 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x801) r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000ffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x0, 0x0, 0x5f5) lseek(r3, 0x0, 0x3) [ 339.110131] protocol 88fb is buggy, dev hsr_slave_0 [ 339.115668] protocol 88fb is buggy, dev hsr_slave_1 03:21:16 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="05630440"], 0xffffffffffffffeb, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000700)=[@acquire], 0x0, 0x0, 0x0}) [ 339.184710] ptrace attach of "/root/syz-executor.4"[12448] was attempted by "/root/syz-executor.4"[12450] 03:21:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x476, 0x101002) write$evdev(r0, &(0x7f00000000c0)=[{{}, 0x14, 0xa59}], 0x18) [ 339.254260] binder: 12453:12454 ioctl c0306201 20000200 returned -14 [ 339.274785] binder: 12453:12454 ioctl c0306201 20000200 returned -14 03:21:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffefff}, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00\r\x00\x00\x00\x02\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4}, 0x14) sendto$inet6(r3, &(0x7f0000001ac0)="4500009613076193cd3ba336f144d803550853233450d8397bd15b435b02f467ac3afa42e3488641c01c702e4483bafa2bd2c87236bd1c4eed7f7614b6321095e382b085c3875f0806d97f58da4ce16c77ac304b87f98721aad51802c86dc099c0f8327fa378011bc873a23e04fdfa66a3990e494c9e39ce8f9b5bedec38253ecc121b559efff2cd722a837f38761759fb4816dbc307", 0x96, 0x0, 0x0, 0x0) [ 339.440165] protocol 88fb is buggy, dev hsr_slave_0 [ 339.445341] protocol 88fb is buggy, dev hsr_slave_1 [ 339.600175] protocol 88fb is buggy, dev hsr_slave_0 [ 339.605478] protocol 88fb is buggy, dev hsr_slave_1 [ 339.626272] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 339.637847] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 339.651484] IPVS: ftp: loaded support on port[0] = 21 [ 339.690192] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 339.840217] protocol 88fb is buggy, dev hsr_slave_0 [ 339.845541] protocol 88fb is buggy, dev hsr_slave_1 03:21:16 executing program 3: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f00000000c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = gettid() recvmmsg(r0, &(0x7f0000003c00)=[{{0x0, 0x0, &(0x7f0000003b00), 0x0, &(0x7f0000000180)=""/106, 0x28}}], 0x400000000000116, 0x0, &(0x7f0000000000)={0x77359400}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1004000000013) 03:21:16 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:16 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYPTR64, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef47628488498f2c8c6624e7329e5b17f60fe94e963686a647bbcddc1417ad4f79", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8137f38a3729f9fbaa545c0c343d9b3bec2feff1f63caf2a574ca1619d1bf75eab0661bd06a31db8bbe4406c651680ba38d2e34d596881a7fb3f462bf962a61abf0"], 0x0, 0xd1}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:21:16 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:21:16 executing program 1: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x1, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) 03:21:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000140)=[{0x1c}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f000000ac80), 0x7c, 0x0) 03:21:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @rand_addr, 0xde5}, 0x1c) pipe(&(0x7f0000000200)) dup2(0xffffffffffffffff, r0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087707, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x526987c9) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x526987c9) connect$inet6(0xffffffffffffffff, 0x0, 0x2b7) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) listen(r0, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xded3740f62a47da, 0x20000004, &(0x7f00000002c0)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080), 0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, 0x0) write(r2, &(0x7f0000000340), 0xffffffec) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r3 = accept4(r0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 03:21:17 executing program 4: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r1, &(0x7f00000000c0)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) [ 340.222147] ptrace attach of "/root/syz-executor.4"[12488] was attempted by "/root/syz-executor.4"[12492] 03:21:17 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x19c}}], 0x1, 0x0, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 03:21:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) bind$netlink(r0, &(0x7f0000000700), 0xc) 03:21:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0xfffffffffffffffe) 03:21:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)='\f', 0xa}]) io_destroy(r2) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 03:21:17 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000001100)=""/234) 03:21:17 executing program 2: getresuid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000001640)) 03:21:17 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 341.007163] syz-executor.3 (12490) used greatest stack depth: 24208 bytes left 03:21:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) ptrace$getsig(0x4201, r3, 0x0, &(0x7f0000002200)) [ 341.090859] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 341.161524] ptrace attach of "/root/syz-executor.2"[7169] was attempted by "/root/syz-executor.2"[12577] [ 341.232248] ptrace attach of "/root/syz-executor.2"[7169] was attempted by "/root/syz-executor.2"[12587] 03:21:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r0, 0x5502) 03:21:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:18 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4000000000008) 03:21:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'team_slave_1\x00', 0x4fff}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000003c0)={'team0\x00', 0x400}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:21:18 executing program 2: msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x5) 03:21:18 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x21, 0x0, &(0x7f0000000000)="3f006671d7af52f647750500080089ea0100000080000500a708f78293c8744e1a", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x32) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000000)=0x2) 03:21:18 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000540)=@generic={0x3}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[0xe0ffffff, 0x3], [], @local}}, 0x1c) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x29d}}, 0x0) recvmmsg(r3, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) [ 341.378917] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 341.446274] input: syz1 as /devices/virtual/input/input22 [ 341.477213] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 341.485557] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0x0) [ 341.564363] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 341.722099] input: syz1 as /devices/virtual/input/input23 03:21:18 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x14}, [@ldst={0x3}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 03:21:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000b67000), &(0x7f0000000140)=0x4) 03:21:18 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="090000000000363909000000ba27c305736ea125bd", 0x15}], 0x4, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:21:18 executing program 1: clone(0x898a8c00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:21:18 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x101064, 0x0) ftruncate(r0, 0x2007fff) 03:21:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fadvise64(r3, 0x0, 0x4ecfb, 0x4) 03:21:18 executing program 4: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000840)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000002c0)) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x94) getdents(r4, &(0x7f0000000080)=""/36, 0x24) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="0800a1695e0bcfe87b0071") getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000980)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r6 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x0) r7 = syz_open_dev$mice(0x0, 0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000000005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000000000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000000000"], 0xb8}}, 0x0) fcntl$dupfd(r8, 0x0, r7) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x1fb) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r9 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) sendfile(r6, r9, 0x0, 0x8000fffffffe) [ 342.046010] ptrace attach of "/root/syz-executor.4"[12638] was attempted by "/root/syz-executor.4"[12644] [ 342.061817] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:19 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:19 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x200010, 0x0) chdir(&(0x7f0000000300)='./file0\x00') geteuid() r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x108200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) timerfd_gettime(0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:21:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000300), 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0xfe) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r3, &(0x7f0000000040)) ftruncate(r3, 0x0) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2000000, 0x8010, 0xffffffffffffffff, 0xffffc000) ftruncate(r4, 0x81fd) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'gretap0\x00', 0x4000}) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 03:21:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:19 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0xe0003f01, &(0x7f0000000180)={&(0x7f0000001440)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000020000000000000000030006000000f9180200ee00e0000054d81458106fe8b90002000100000000000000030200044a7b030005000000000002000000e0003f010000000000fca0d971e9fd2bb4b88e524ae03e6521c84c7afa5c0000f30f16cd3ba77e4d5a8a682d271d4e0b57a07686d8cd335d8541ca148e882dc5bafceed2dedb06c1d95dfcc7e08e6dc8bbcceb36c800"], 0x60}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) writev(r0, &(0x7f0000000080), 0x10000000000000f8) 03:21:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 343.046795] audit: type=1804 audit(1574133679.835:132): pid=12678 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/211/file0/bus" dev="ramfs" ino=45394 res=1 03:21:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:19 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x0) socket$netlink(0x10, 0x3, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) close(r0) 03:21:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:20 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) [ 343.140946] audit: type=1804 audit(1574133679.865:133): pid=12684 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/211/file0/file0/bus" dev="ramfs" ino=45399 res=1 [ 344.000171] net_ratelimit: 16 callbacks suppressed [ 344.000176] protocol 88fb is buggy, dev hsr_slave_0 [ 344.010285] protocol 88fb is buggy, dev hsr_slave_1 03:21:20 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:20 executing program 4: personality(0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) uname(&(0x7f0000000180)=""/161) 03:21:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:20 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd(0x0) fcntl$dupfd(r1, 0x0, r2) fgetxattr(r2, &(0x7f0000000100)=@random={'btrfs.', '\x00'}, &(0x7f0000000180)=""/89, 0x59) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @empty}, {0x2, 0x4e24, @empty}, {0x2, 0x4e23, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='lo\x00', 0x9, 0x100, 0x7}) 03:21:20 executing program 1: connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) r0 = inotify_init1(0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, &(0x7f0000000000)=""/250, 0x128b9372) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) clone(0x2100000, 0x0, 0x0, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) pipe(&(0x7f0000000340)) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000180)=""/146) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f0000000280)='system\x00', 0x7, 0x2) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 03:21:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:20 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) [ 344.119705] ptrace attach of "/root/syz-executor.1"[7167] was attempted by "/root/syz-executor.1"[12727] [ 344.148646] ptrace attach of "/root/syz-executor.1"[7167] was attempted by "/root/syz-executor.1"[12727] 03:21:21 executing program 4: capset(&(0x7f0000000800)={0x20080522}, &(0x7f0000000840)) r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000cab000)=0x3c4) setresuid(0x0, r1, 0x0) 03:21:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0xfff9}, 0x20) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) 03:21:21 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:21 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) [ 344.259454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 344.339345] ptrace attach of "/root/syz-executor.1"[12754] was attempted by "/root/syz-executor.1"[12756] 03:21:21 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r1+30000000}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:21 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785363940aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb0353cffd7a7c0c92465e5f9cc2d3fbf0322168078aba9d7ae45b0051a1221af2772a9567bb82194", 0x57}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:21:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_buf(r0, 0x1, 0x22, &(0x7f0000001340)=""/4080, &(0x7f0000000000)=0xff0) 03:21:21 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:21 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r1 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r2 = syz_open_dev$binderN(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000012c0)={0xc, 0x0, &(0x7f0000000300)=[@free_buffer={0x40086303, r1}], 0x0, 0x0, 0x0}) 03:21:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@flushpolicy={0x1c, 0x1d, 0x4e326d0846e0c50d, 0x0, 0x0, "", [@policy_type={0xc}]}, 0x1c}, 0x8}, 0x0) 03:21:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 345.202277] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 345.213954] ptrace attach of "/root/syz-executor.4"[12767] was attempted by "/root/syz-executor.4"[12771] 03:21:22 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000000c0)='./file0\x00') mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) ftruncate(r2, 0x0) 03:21:22 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 345.350120] protocol 88fb is buggy, dev hsr_slave_0 [ 345.355295] protocol 88fb is buggy, dev hsr_slave_1 [ 345.378683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 345.439964] audit: type=1800 audit(1574133682.225:134): pid=12795 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17537 res=0 03:21:22 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:22 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x0, 0x0, 0xe}) 03:21:22 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) setuid(0x0) wait4(0x0, &(0x7f00000000c0), 0x6000000a, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x2a) r6 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, &(0x7f0000000080), 0x9001) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d80000001900310e0000000000000000ac1e0001000000000000000000000000000100000000000000000a00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d55942398f1e0218ba07a4da0a3c535fd8d1f86aa46f677f32d240f3a21619b0f5ad6c6260efeedb0cba8a6eca9ea56e6db6df9"], 0x4}, 0x8}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'nr0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x8000001b, &(0x7f0000002400)={@local}, &(0x7f0000002440)=0xf) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000027c0)={@remote, @broadcast}, &(0x7f0000002800)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'ip6gretap0\x00'}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000002a80)={'rose0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002b40)={@loopback}, &(0x7f0000002b80)=0x14) r7 = openat$null(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendmsg$nl_netfilter(r7, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000002bc0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000300)=0x3d0) accept4$packet(r2, 0x0, &(0x7f0000002e00), 0x800) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@empty}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000002f40)=0x3a) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003000)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r8 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, 0x0, &(0x7f0000003280)) open(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) accept4$packet(r2, 0x0, &(0x7f00000045c0), 0x800) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) sendto$inet(r3, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x3d2) setsockopt$sock_int(r3, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 03:21:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:22 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 03:21:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 345.588340] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 345.641496] audit: type=1800 audit(1574133682.435:135): pid=12812 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17524 res=0 [ 345.659703] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 345.674932] protocol 88fb is buggy, dev hsr_slave_0 [ 345.674984] protocol 88fb is buggy, dev hsr_slave_1 03:21:22 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:22 executing program 4: unshare(0x40000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x8, 0x8}, 0xc) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfa87b0071") ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 03:21:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, 0x0}, 0x0) [ 345.765405] audit: type=1804 audit(1574133682.555:136): pid=12820 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/217/bus" dev="sda1" ino=17537 res=1 [ 345.840119] protocol 88fb is buggy, dev hsr_slave_0 [ 345.845442] protocol 88fb is buggy, dev hsr_slave_1 [ 345.868926] audit: type=1800 audit(1574133682.615:137): pid=12827 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17535 res=0 [ 345.876621] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 345.932166] device lo entered promiscuous mode 03:21:22 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:22 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, 0x0}, 0x0) 03:21:22 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:22 executing program 2: dup(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="000000000000000000000000001300"}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x800000000000273, 0x0) [ 346.070974] protocol 88fb is buggy, dev hsr_slave_0 [ 346.076198] protocol 88fb is buggy, dev hsr_slave_1 [ 346.085388] IPVS: ftp: loaded support on port[0] = 21 03:21:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, 0x0}, 0x0) 03:21:22 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 346.132040] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 346.155691] audit: type=1800 audit(1574133682.945:138): pid=12847 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17557 res=0 03:21:23 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}}, 0x0) [ 346.281280] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 346.287635] audit: type=1800 audit(1574133683.075:139): pid=12856 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17520 res=0 03:21:23 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x207199eb96bdb64e}}, 0xb8}}, 0x0) 03:21:23 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}}, 0x0) [ 346.910948] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:25 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:25 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:25 executing program 2: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffc, 0x0) 03:21:25 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}}, 0x0) 03:21:25 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x1}) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f00000018c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000000c0)="18", 0x1}]) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000680)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000d0008001b000000000008000d0001000000cdf1e1b6503400c8ff2e19dee14b5331d9f01816791dcd0f0c71df3719a41859fbb0959f00ac0dc6f62495fd61892a20f1d0f3929342bac8db0b360b58cc01a76416110cb0fcea06a92ce4c8902e1b9a97c21ff62fc7e82614025180fa45d43c74e25f22f22849988d27733df048969694d40176bd88d15682d1c399fd2abcb2edb8fba6e3bccd16e25699d007980dab820f1610448c66f4f3e2aa07f4779c776cceff6e10332ede266c815c4bfa05d6d8215effbb9f5e1c543821040cce61fb2b484f6f31cb8292bc98013f102029dc6a9c6eb55c3c008000009808e2c99bdb56105bbdfc24736b81f793627e547e8a78bdce74c007258bccd875959acacd3db2f30b0419d5aa77d9775cf71b76097e315e43d5e266ac0fe4f9a8deb97d738f57cc1d544563884f4400a34207356babe8ec7f56e38d60f780f3ce13641c7ec4388c3ab076a1837c48bd1350fdfe4efaf60ea509e2a5d43337a970f224cdf418c8d9440f7278ae06399e"], 0x30}}, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 03:21:25 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 349.153895] audit: type=1800 audit(1574133685.945:140): pid=12882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16722 res=0 03:21:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000c80)=""/226, 0xe2}, {&(0x7f00000001c0)=""/143, 0x8f}], 0x2}, 0xfff}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000006c0)=""/12, 0xc}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/86, 0x56}, {0x0}, {0x0}], 0x5}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000001580)=""/4101, 0x1005}], 0x1}}], 0x4, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:21:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) [ 349.196527] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:26 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:26 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) [ 349.278846] audit: type=1800 audit(1574133686.035:141): pid=12891 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16642 res=0 [ 349.284160] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:21:26 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 349.325572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) [ 349.401841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 349.423783] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:21:26 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:26 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 349.435975] audit: type=1800 audit(1574133686.195:142): pid=12907 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16820 res=0 03:21:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) [ 349.502832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 349.511515] net_ratelimit: 8 callbacks suppressed [ 349.511521] protocol 88fb is buggy, dev hsr_slave_0 [ 349.511575] protocol 88fb is buggy, dev hsr_slave_1 [ 349.554112] audit: type=1800 audit(1574133686.345:143): pid=12918 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16753 res=0 [ 349.601216] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 349.627556] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 349.636569] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 03:21:26 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0x119) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 03:21:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) [ 349.830142] protocol 88fb is buggy, dev hsr_slave_0 [ 349.835475] protocol 88fb is buggy, dev hsr_slave_1 [ 349.990181] protocol 88fb is buggy, dev hsr_slave_0 [ 349.995353] protocol 88fb is buggy, dev hsr_slave_1 03:21:26 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) 03:21:26 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 350.131786] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 350.230145] protocol 88fb is buggy, dev hsr_slave_0 [ 350.235262] protocol 88fb is buggy, dev hsr_slave_1 [ 351.590188] protocol 88fb is buggy, dev hsr_slave_0 [ 351.595556] protocol 88fb is buggy, dev hsr_slave_1 03:21:29 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:29 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c82838273804212b18d7c4ca85e87a64820546a1e9ed56adb1b30410bd88518f20851587978e30359f8cf068dc3cbc3d5013ed6063b91e7f1ffd7e4ab56ad8e3980900b61a0bf7a301ffe8db02ab2156da58a5d1a000000000000000000005dae3ae984ad0f24a256c61c2578bafbb10000000000", @ANYBLOB="e6c55c3df4e86601000000010000009b2861343d72748d52864e01000000002ee70a67757310554a9ca66864eef1c8c72be40825f38b6c78f0bebc3176300000000400000000000000bc31810c25a2fc4d1153e55bc2fdfd711337bf1a3014f87159f469c30ae6b94f07fefb66764d49d14ae837f703000000acb50755821f9e16dfd1238029707d454e3132d8f04ca925b973fac1aa073d84803f64ca1aadc41265c7ea6a2c28cc883a83a9e8f56309733a60a6a34f5869e70930be77ff38878b3920b9268f3106095fefea61f09c721a983f052d8df3816f3155469a4a06157c6582d037707203bd3d"], 0x0, 0x95}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:21:29 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:29 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYPTR64, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45c7737872b56070000000000000036bc"], 0x0, 0x41}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:21:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) [ 352.391903] ptrace attach of "/root/syz-executor.4"[12949] was attempted by "/root/syz-executor.4"[12951] [ 352.408717] ptrace attach of "/root/syz-executor.2"[12954] was attempted by "/root/syz-executor.2"[12955] [ 352.416780] kauditd_printk_skb: 1 callbacks suppressed 03:21:29 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea942494855", @ANYPTR64, @ANYRESOCT, @ANYRESDEC], 0x0, 0xe6}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:21:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x84041) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1000000000001001, 0x2000000000071, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "d7a0feeaf9992a6274e4f1332653397608757f6f8e05f5017251c50001000000000000fcb04a12158bed9e762dfe000000000000000000000000000000006f00", "f9d8bea67f0100587e1c2dcc29a48bd5ed4ebd603f89ae9040c5ca8346fa5bac"}) [ 352.416789] audit: type=1800 audit(1574133689.205:145): pid=12953 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16977 res=0 03:21:29 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_DUMPABLE(0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) rt_sigsuspend(&(0x7f0000000040), 0x8) sendfile(r0, r1, 0x0, 0x2007ff) [ 352.501862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 352.532305] ptrace attach of "/root/syz-executor.4"[12964] was attempted by "/root/syz-executor.4"[12967] 03:21:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) [ 352.607049] audit: type=1800 audit(1574133689.355:146): pid=12973 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17106 res=0 03:21:32 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:32 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/enforce\x00', 0x80000, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x80c00) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x25, 0x0, &(0x7f00000004c0)) r0 = socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfb120eb7) ioctl$PIO_FONT(r0, 0x4b61, 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents(r4, &(0x7f0000000040)=""/253, 0xfd) r5 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000800}, 0xc, &(0x7f0000000300)={&(0x7f00000009c0)=ANY=[@ANYBLOB='~\n\x00\x00\x00\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="040029bd7000ffdbdf25020000000c200110080009002b0000001800010008000200870000000c0007002000000005000000080004003100000054000200080004000100000008000900210800000800030004000000080005004000000008000300020000000800050065090000"], 0x3}, 0x1, 0x0, 0x0, 0x30000000}, 0x801) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000680)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x42400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000880)={0x128, r6, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x9fee2aad287305cc}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_DEST={0x78, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x6c65991dc333d6de}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="09f89eaa1d216a9e0d02e0978a7af49c"}]}]}, 0x128}}, 0x1) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000007c0)) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000540)="9033877ace25a0cd47de5752f2fe725302f5297240df794a3f9e8efd1c159b2bb4cfdc71f2cd4ccab950100494a6edc071a5b8facd4080eb02bd8342acfb2c0241fa15a8f3b27755b25c65f4ab48338111ffa1fe393a425c0ba2c13067100170698a151664c4152a8824af1cb68d98f0259494c6d057", 0x76}, {0x0}, {&(0x7f00000002c0)="f7fc370763ed7a4dbfaf549cd1dc94c047d2bfd2da573ebddcf5db435637f045346375f1b75c21a0106605fa2c283aaa0014062099dc4b58d700b3a07dbc83010c24cb730b30aee0103d81b75a4f6ce90dd0237bd4b22d66e95966a0ad75b3f8338268b29e2dd7c90b5b33722b010ce947eab220e38600b4", 0x78}, {0x0}], 0x4}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000080)="4326b5be4c72829e48001bfdce33d9a34689f07e340cec408be4e862cc21d93ea75e6e79c33cb2966b5a3e0a60677b6dbbb84bd6946d811304b2269c4dfbf4b532516ea09b4413681d63ea", 0x4b}, {&(0x7f0000000b40)="70799d7f93aecd5740609238367b30d5bd2da4a8a782f1e2bfe6e09ea5587d2488139bce0b6720aa3beec624a66fba665935593f143410e814194574d6c5caa5a0a643a77a6837f10a97664379ac508c2c604e84b914cca11d7c13c7516775c47b89811abd1b86bdc06b4c2df598cc7f7707a1c0400e52e98972dcc961b5a697d45539c7b8f018ed83ff9a7e106143298689be64290c67", 0x97}, {&(0x7f0000000d40)="268c50b6257e6caa1f09d6d765bcc675095694fb75e62bee459311dc547354cfaab92fa9670d7f1dab24", 0x2a}, {&(0x7f0000000f40)}], 0x4}}], 0x2, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r3, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000140)={{0x10, @dev={0xac, 0x14, 0x14, 0x2a}, 0x4e22, 0x2, 'wlc\x00', 0x4b, 0x8, 0x61}, {@rand_addr=0x40, 0x4e22, 0x2000, 0x863, 0xfffffffe, 0x8}}, 0x44) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r7, &(0x7f0000000780)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000001) add_key$keyring(&(0x7f0000001580)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, &(0x7f00000016c0), 0x0, 0xfffffffffffffff8) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) 03:21:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:32 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) 03:21:32 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff030}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 355.539897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xbc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x4}]}, 0xbc}}, 0x0) 03:21:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 355.569131] audit: type=1800 audit(1574133692.355:147): pid=13003 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17297 res=0 03:21:32 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xbc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x4}]}, 0xbc}}, 0x0) [ 355.658936] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xbc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x4}]}, 0xbc}}, 0x0) 03:21:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 355.734862] audit: type=1800 audit(1574133692.525:148): pid=13019 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17361 res=0 [ 355.762550] net_ratelimit: 14 callbacks suppressed [ 355.762556] protocol 88fb is buggy, dev hsr_slave_0 [ 355.762602] protocol 88fb is buggy, dev hsr_slave_1 [ 355.864456] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 356.070180] protocol 88fb is buggy, dev hsr_slave_0 [ 356.075337] protocol 88fb is buggy, dev hsr_slave_1 [ 356.230160] protocol 88fb is buggy, dev hsr_slave_0 [ 356.235327] protocol 88fb is buggy, dev hsr_slave_1 [ 356.470183] protocol 88fb is buggy, dev hsr_slave_0 [ 356.475599] protocol 88fb is buggy, dev hsr_slave_1 [ 357.830146] protocol 88fb is buggy, dev hsr_slave_0 [ 357.835351] protocol 88fb is buggy, dev hsr_slave_1 03:21:35 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:35 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0x0, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) 03:21:35 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) clone(0x4001ffff, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:21:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1c, 0x4) 03:21:35 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0x0, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) [ 358.601908] audit: type=1400 audit(1574133695.395:149): avc: denied { setopt } for pid=13035 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 358.629463] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='V', 0x1, 0xfffffffffffffffe) keyctl$invalidate(0x15, r2) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) [ 358.658154] audit: type=1800 audit(1574133695.395:150): pid=13042 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17571 res=0 03:21:35 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0x0, @in=@local, 0x0, 0x1}]}]}, 0xfc}}, 0x0) [ 358.746901] audit: type=1800 audit(1574133695.475:151): pid=13049 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17457 res=0 [ 358.778432] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 358.823564] audit: type=1800 audit(1574133695.595:152): pid=13061 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17571 res=0 [ 358.911796] IPVS: ftp: loaded support on port[0] = 21 03:21:38 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:38 executing program 4: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x2000000, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f0000000100)='./file0\x00', 0x0) 03:21:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local}]}]}, 0xfc}}, 0x0) 03:21:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:38 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:38 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet(0x10, 0x3, 0x0) write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0x0, 0x4, {{0x379a5467}}}, 0x28) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x51069415c4cca95e}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x40, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x6}, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x2}, &(0x7f0000000400)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x2}}, 0xb) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000580)="4c0000001200ff09fffefd956fa283b724a60080000000000000006835400b908cea1d001fc41180b598bc593ab68d1148a730de33a40400c62b2ca654a6613b6aabe88f799a0d4a4c712b5137", 0x4d}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000001b40)=[{{0x0, 0x397, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f00000001c0)={0x77359400}) r4 = syz_open_procfs(0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x7, @mcast1, 0x6}, 0x1c) geteuid() r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) fcntl$setsig(r5, 0xa, 0x1) pipe(&(0x7f0000000080)={0xffffffffffffffff}) write$nbd(r6, &(0x7f0000000600)={0x67446698, 0x1, 0x4, 0x0, 0x4, "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"}, 0x1010) 03:21:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local}]}]}, 0xfc}}, 0x0) [ 361.666479] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 361.675377] audit: type=1800 audit(1574133698.455:153): pid=13083 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17588 res=0 03:21:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000940)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6=@loopback}, 0xe, @in=@local}]}]}, 0xfc}}, 0x0) [ 361.810733] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 361.844703] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 361.891318] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 361.908568] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 361.917997] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a4853", 0x3f}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 361.939522] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 361.971254] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 03:21:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 361.990235] net_ratelimit: 14 callbacks suppressed [ 361.990250] protocol 88fb is buggy, dev hsr_slave_0 [ 362.000442] protocol 88fb is buggy, dev hsr_slave_1 [ 362.046168] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 03:21:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 362.087515] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 362.104575] ptrace attach of "/root/syz-executor.3"[13098] was attempted by "/root/syz-executor.3"[13102] [ 362.310120] protocol 88fb is buggy, dev hsr_slave_0 [ 362.315345] protocol 88fb is buggy, dev hsr_slave_1 [ 362.470128] protocol 88fb is buggy, dev hsr_slave_0 [ 362.475415] protocol 88fb is buggy, dev hsr_slave_1 [ 362.710193] protocol 88fb is buggy, dev hsr_slave_0 [ 362.715740] protocol 88fb is buggy, dev hsr_slave_1 [ 364.070183] protocol 88fb is buggy, dev hsr_slave_0 [ 364.075420] protocol 88fb is buggy, dev hsr_slave_1 03:21:41 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:41 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000040)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f15da7f48295eb1000000000000", 0xa9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:21:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:41 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:41 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) 03:21:41 executing program 2: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000000c0)=0x5) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfb120eb7) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[]}}, 0x0) fsetxattr$security_ima(r2, &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000440)=@sha1={0x1, "f6c22f460365f9360c48948b1b0b911ab5185102"}, 0x15, 0x2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) socket$unix(0x1, 0x5, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000340)=@md5={0x1, "86ee741e65596c5d12183d4e4a409aa4"}, 0x11, 0x2) ioctl$FIBMAP(r1, 0x1, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r3, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}, {&(0x7f00000002c0)="f7fc370763ed7a4dbfaf549cd1dc94c047d2bfd2da573ebddcf5db435637f045346375f1b75c21a0106605fa2c283aaa0014062099dc4b58d700b3a07dbc83010c24cb730b30aee0103d81b75a4f6ce90dd0237bd4b22d66e95966a0ad75b3f8338268b29e2dd7c90b5b33722b010ce947eab220e3", 0x75}, {0x0}], 0x3}}, {{0x0, 0x0, &(0x7f0000001f40)=[{0x0}, {&(0x7f0000000f40)="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", 0x34b}], 0x2}}], 0x2, 0x80) sendto$inet(r3, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) 03:21:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x2, 0x6d, 0x20000000000001, 0x0, 0x0}, 0x2f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000040), 0x4}, 0x20) [ 364.651333] ptrace attach of "/root/syz-executor.3"[13116] was attempted by "/root/syz-executor.3"[13120] [ 364.674942] audit: type=1800 audit(1574133701.465:154): pid=13122 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17599 res=0 03:21:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x4d5, 0x32}, 0x0, @in6=@rand_addr="00c8e8767e00", 0x0, 0x0, 0x0, 0x5}}, 0xe8) r2 = dup(0xffffffffffffffff) creat(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 03:21:41 executing program 4: 03:21:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:41 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) waitid(0x0, 0x0, 0x0, 0x100000a, &(0x7f0000000100)) 03:21:44 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x0}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:44 executing program 4: futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x3000000) 03:21:44 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0408cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYRES64=0x0, @ANYBLOB="8b91df53d46cd7a573ae62a271418e8af72dae525ec50f99a96c822efccb75ac35264490d1ffee9adb6e05580f3aa076e8ffac3556213ac07d083ab0413bf3d12d29b8f33840c83b0dc9029dd990036622932e237838424e9f76e94143f78b7b1efc1d8eec9d9dd15af0e55339d72f0fdbcf0b820c09f7e0724e217253fb84a40e931d5971de8b2191ddedc74ee412be9d895cfe841d4c33", @ANYPTR64], 0x0, 0xa8}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:21:44 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x2000424, 0x4) write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0xfec) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:44 executing program 3: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007df, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r3 = syz_open_procfs(0x0, 0x0) write$FUSE_NOTIFY_POLL(r3, 0x0, 0x0) sendto$inet(r2, 0x0, 0x2d9, 0x0, 0x0, 0x883ec286b61b281e) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000000240), 0x45483d5a560d7693, 0x0, &(0x7f0000002a80)={0x0, r4+30000000}) socket$nl_xfrm(0x10, 0x3, 0x6) gettid() close(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000080)=0x4008000) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r6 = socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(r6, 0x1, 0x2c, &(0x7f0000000000), 0x4) fcntl$dupfd(r6, 0x0, r5) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), 0x0) chmod(&(0x7f00000000c0)='./control\x00', 0x9c32f69e6caa24eb) [ 367.727042] audit: type=1800 audit(1574133704.515:155): pid=13171 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17617 res=0 [ 367.734702] ptrace attach of "/root/syz-executor.2"[13169] was attempted by "/root/syz-executor.2"[13174] [ 367.768369] nla_parse: 42 callbacks suppressed 03:21:44 executing program 4: sendmsg$key(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\xf3\xc5w\x98\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe80xffffffffffffffff}, 0x1) accept4$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0xfffffffffffffe57, 0x800) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet(0x2, 0x80000, 0x0) sendfile(r2, r1, &(0x7f0000000000), 0x1) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0xc000000000, 0x42) r3 = getpid() ptrace(0x10, r3) ptrace$cont(0x420b, r3, 0x8, 0x20008000) r4 = getpgrp(r3) r5 = syz_open_procfs(r4, &(0x7f00000002c0)='mountinfo\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000380), &(0x7f0000000540)=0x10) preadv(r5, &(0x7f0000000580)=[{&(0x7f0000000200)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x4, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r6, 0x29, 0x1000000000021, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x5, @dev}, 0x1c) ioctl(r6, 0x1, &(0x7f0000001480)="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") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/\xee\x00\x00\x00\x00\x00\x00d\x00', 0x0, 0x0) r9 = dup3(r7, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x4001ff) ioctl$RTC_PLL_SET(r9, 0x40207012, &(0x7f0000000040)={0x81, 0x2, 0xfffffffffffffffc, 0x0, 0x5, 0x100}) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) clock_settime(0x6, &(0x7f0000000340)={r10, r11+10000000}) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000180), 0xf0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) gettid() epoll_wait(r0, &(0x7f00000003c0)=[{}, {}, {}], 0x15555555555552aa, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) r12 = dup2(r1, r1) sendmsg$NBD_CMD_RECONFIGURE(r12, &(0x7f0000000500)={0x0, 0x148, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYRESOCT=0x0], 0x1}}, 0x0) write$cgroup_type(r12, &(0x7f0000000140)='t\x02\x04\x00', 0xfffffefa) 03:21:44 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x2000424, 0x4) write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0xfec) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 367.768376] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:21:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) r3 = syz_open_procfs(0x0, 0x0) preadv(r3, &(0x7f0000000500), 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) 03:21:44 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0417cd8034"], 0xae}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRES64, @ANYBLOB="b7e41205a1300249b93350095d95d195a83517dd6210479b1078284a3ba12d9101ac559e6c59a730307b0d9f48c80344c7c6d7a2636d794c822b5c1748689ac03ad8ca976f368524dafcfcf947d2b9e07239ae87f6323d0ef51895f46216eb0e", @ANYPTR, @ANYRES32=0x0, @ANYRES64, @ANYRESDEC, @ANYPTR64, @ANYBLOB="b4fda7b24f8e34ed989b1f84834a0d2dc4b0f0a947b1d6d8fc296b35d2f9971dfc71cb4f230bc9ea28c14e7e42a35bbd0ac60f252ce247d9f2f3b9e614e6890db5756ab1996624f08ad89a7b03911431142faf9ddfe968f1f0e3ef19e3df1ed2ff3a0961"], 0x0, 0xfc}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 367.926872] audit: type=1800 audit(1574133704.715:156): pid=13194 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17622 res=0 [ 368.047419] ptrace attach of "/root/syz-executor.2"[13206] was attempted by "/root/syz-executor.2"[13207] [ 368.230206] net_ratelimit: 14 callbacks suppressed [ 368.230222] protocol 88fb is buggy, dev hsr_slave_0 [ 368.240371] protocol 88fb is buggy, dev hsr_slave_1 [ 368.560119] protocol 88fb is buggy, dev hsr_slave_0 [ 368.565285] protocol 88fb is buggy, dev hsr_slave_1 [ 368.710179] protocol 88fb is buggy, dev hsr_slave_0 [ 368.715292] protocol 88fb is buggy, dev hsr_slave_1 [ 368.950153] protocol 88fb is buggy, dev hsr_slave_0 [ 368.955422] protocol 88fb is buggy, dev hsr_slave_1 [ 370.310154] protocol 88fb is buggy, dev hsr_slave_0 [ 370.315431] protocol 88fb is buggy, dev hsr_slave_1 03:21:47 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x0}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:47 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x2000424, 0x4) write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0xfec) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x35) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 03:21:47 executing program 4: setrlimit(0xb, &(0x7f0000000180)) timer_create(0x0, 0x0, 0x0) 03:21:47 executing program 3: io_setup(0x3, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000140)='sec]ritynodev:ppp1bdev\x00', 0x0) io_submit(r0, 0xd8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) 03:21:47 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:47 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="f2", 0x1, r0) keyctl$set_timeout(0xf, r4, 0x0) [ 370.775260] audit: type=1800 audit(1574133707.565:157): pid=13223 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17630 res=0 03:21:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:47 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:47 executing program 3: waitid(0x6, 0x0, 0x0, 0x2100000c, 0x0) 03:21:47 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 370.934658] ptrace attach of "/root/syz-executor.2"[13238] was attempted by "/root/syz-executor.2"[13240] 03:21:50 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x0}}, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:50 executing program 4: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_FP_MODE(0x2e) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) r2 = creat(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x8}) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000740)={@mcast2, 0x5f, r3}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000c80)={0x8, "5f5539ae7383df635d7eb9f00cde999ef4e1d4fbae589edcbcd64ae9781d89f20a7c347bd734db9d80a3e9ee0d0f04fe5305dacf9e656dc623d0d8abb05b81ebf7fa83533ebfe364612ee7d5571be6e3af5eccf0e26370ff66a26e95f4b7b1206b9d9a70fe612b356ec5074716b0e71eb9f60ac1c5e653c9a7de0de9a5f8c8047f77ece27201fc36e2ca04338864356e123b3b96be97afa5d6698e6f08a657f7ad07b42df05dfca83247581434b575e2d4419e52f1103e9e3ddc440a98f9caeace71f8affb3cfc62e4b428403787ff063d2923a50c0410f191c7923b77c51fea54cc7f2b8adcd2a5e1f53495c168736a160f28435b70f6e40df8523c2deaef8b70f13bc408d1d6eb05dbcae35f0c12cb00b8d589c0dda912acf9315852e1cbb85857f9421cd623fc5046448db22eec3c07358c4778c73a2495bf3452b18d8e904ed88ae250a99edb20b78fc923ccc841847a4f6d514320309afe2f0a075e50096c7a8cd4da2d88791d01a10cea10a97d32e8bb05a5e2bf52be5fffa3fb26953a0fadac598644cf0297d01d5c1ed9f2123ba789fa650b0d140a478903cc23a5b5c2a2a52f19bdd40039ac0291f648f1f991e272c52669f7843e73b3be22103fe0a88d5d405b9ecea5d602be0b5466d18d8a971b69a8e80e48621103a6bc6ee3a7b70b199005241779f22fa2cc159988eaf2d53c858ec06ab56acc232b587ffee3a5cb29f5641b2189fb1617d1a652e42511fe2e447a2636f18ceabc261126200193eb9f309f80aa204a93883bf6fb247ade866685f300295f8735e18d1d81365dbd2bddfa1779c59effed803bbe0a68302b1ab0f0d00892138ad24d52d653d92897bd28c2f031a77eae54ef3ce9a1fc44ea41763b2d780a454f68ea1a297302b4fa6664923a818040f5a74e0db3ff24e940e97d4abff40af2d36f7bceb8a0c5e90dbefbc8ba496f6e42f11ce11fb20655138f9387938abc3aa3a742f749a8695d972c537127519f654945bac96f0a2ef9d6b24f2226ae677684e3eb63041d6b5105777a8e6aa41ff11366448c0af1ddf5e3f2a1d828b4c9ede3809eab736c9035f2a7032ce38b699dfdc3e158e1ce62d325441e1b05a3ba5f663f20b0cb703cb2960aad298177881aa6b52bf4ae112c5d2bb691ac34b0723be7ddcfff0015e578475db1f062c5a50b54bbcba2f591eb4d6de66f386b0d5dd3975229ad25ae95d82266dfb9c1a6f497ef54b6ac5ee81edae16c47e89f9a435377dfac411db459559ce483921251745b8b94f69d4815b009ea86aedc5a75a516ff2afaff9a418f73c2cacbcdf45dd02ba962399f9b81e149635c2b4c0bda790a6d72fc243f6fbc73d0a0636db51c03d93b44b42c07f2269b465231f953e6a45dc549e9b5ef05443da7820cd667f5b0ff47a13f0a3df630a6f98f72e09978b829389d6a11afb0a7a0988822bb95fcb50399e51295f464662118646d2996da0fa710b082036820ae0a60828479bad4489061244b74179cfec74ab273551190c0eb2ca95be86391b8e469454796d04b29646b8aaae49889ffd84e83e33fb0cd7b10d778e72422f474911897dbd4548d9658e9af23cfff0ad4a7d750ab59e0f8988082ab7ac8d27eeab1c5809de6694aba8ee6ff1ba23d422f38dc026a77933cb0fc916d22131f7f736e35c881c5551f13a5037f65b9090372bb8e73bb9cd686715afef6b40ff275a978078c1e1c7db358285e5caee5c53cb4a7b446db91e5c0615342265edd9f09a72002aae56c7ad4269a0513569db514ee852724cdcccb72e8836fc270f7aa03e03e65f4572c2909e6fb1b557e89c3b505ba2f2b10b545513758abdbdc5b3e5ec1fe4d6bd5947b354058eccb79f10e971a85bdafa5aa27224acc734d884f9282ed033fc540defa3181d451713565d940879cd70a1d704b9a390de509351d5129bff18051b0c7ca196a78d3b8d0c8f384c79ad637b2e1770fecfc980960ef403cbc6bb284792cd169133f35aea028d9ffdc1668572dd197db86a26cb6fe1bb822bb76968ef2cd3c384704b75d0f17a50bcce054a400edd3b2f2abf72d2d8a679fdc94216d2d7d43ca1e60aeb5a313f8104f8ae54e75beb6c106cf080b9ecc9a1f91508b37d9ede25a1bede738c3a7f3501391a7b1863fe120ea26c4ff13f1de4588b150f3f2c12a9b9d92e6a8610c788c4d449a91416307a313536e1779bef88028d65a9398c5d1492b729d5f08e34e64fa07507f64297a1f9305a2d68169f653d5c107c9860ca0d822916eb357c646c229e792b1a5da56b35ab971bb82e41581e11f24f9c6b26c019dd2f2f89f2a82b74bd856ed7b46a2d9c07b2856bc39e9a28f271c5bb06db5bfa04d21e37e778b3e03071d25da8bbc91543fe8909603ba92e3455cb0edfe1dc040f12c169a97a5b8fb09f97acda29ab8491e7c9f81320b1a9de5773078557a6a0bdc5a1bfd2d953c47b3e5ccc70d76dc4ba10c297d7591e2c2150b8235de09714fedcf23aedb0ec9586e52f6af6c299256ad5a0a4ce22666be48592977dc5ff5c5eea529b81df4510016240b8fc8489bf59c899bb75481220554d0b9aebf1660cb72b01dfc3ffaac27dc1d36247e86339c6d99fc3ca8edf585fdb236ecdffda1b99819f873367ee5d8fde5d596517f895c9154deab01ca26008edbeadecfe33cae750ff044469a1b3b104b35af0c04a35a48aecf54dd8844b598432b81f67ce232ad46a247cad103274cd7c206d890008b149aaa3310f9794243cc5e04d4bd3e66a5b01ef67044412eba507a20399856cd26fb6233ebc064aa7b5ba94198bc05301dd74d6875b6d3b4731c2a11f0656767a3e6ba0a3d6951a7f9385ff99876891b8150ac5257756ef92a6c3854ccba8f13bca3cd3e66fdc93feefc44c3eba570970e0a6921f1eef24713ed5a174b8e52a0bc1bd3b420bdd0e521835289d29267fca4512caeaf64d1adeba2457864801d30d37e4eea965f8cfdb314f62307d8a12084a65da330f800862cae3876cdffe8c77d982ce9527b069628f0d796c0ec1c1b423ab6eb248e176a9b201d4de572f7901d8d88ae3dc6c3f196a4e3fb81552f16f7a7b7b3a242824b0618a855fc150fe8d484c80b3e1ea6c42f165dcfa7b0b292f9c7f27179d32260d4f472385a8818f7d76133030cf1256153b4162c8c3a3629c01e9b8cb5a30b3d0068d7f0e3727d8159739386511746fad1cfcc98c7af05b489876432957c6d59c51f12ebb62acac90311e6b00cea58b355db5a36718dfb8140d23e64e41ef9d33969cae75ea3ef8f14ad8c9b2d0c8bd7bf4366b091b5992ffbd71800495c0484cbee4b5fffaede0808cdcfa2409227e6b96dd82481d6d00bfff72c29f860b7fa4fa9c3634d9a2e4f7a8ef240c997b749e0562514d5c2c5d66da75149dea37b1cbb347fa0df5be2b9a5ddf20a6d47936b3b55cedc64453e69413a89c8a9eaeda00fccc96281b4f29db0f3e45fa098c77ffe3c0488529ecfa801cdf7fe8a23f6a3aa04acaf4e300c44e6d873f43b9fd4b13cbed2411c97378e07c7a6799d272d36ac8964233130947ed88f727915fa58a4812ceacd6cc6a52bc7fcba5e57543e93d293d5a428c73b194f33ba752b0ebeb0262423e7a8f490707a220857f44e191304cffb93cfc75b217ca306292549c8742fe3aa62a464d40c666115015201c0fef3e9555615f91c3d15b6e1556a9b04febc2ae7e3d689ca5f58b51f2717ae8c5153f2c2a4df11ea8cafcc369327c2a0a6f7946daf09be323d59e4b0e42ebcdeca373a6d70a3286382f1405b7107af899da00dbd52324657870bd18ca26f3ef47e0e81cd335c827512e88f24202836e7a1b505f0d03a23d577430d971458a11ff42e36b2d2883b664d402eb7497a90ba1f94829b6d9c6b4c4f7e9dc49882520a6fd2590cb8b41328541b9076e43f6019c3da9084e57960478c268f4215bb98455fbd2981e7e37caf7aaf9008f87cfe196da930637c55da5a34e142a433494e6f92a5985d7e6fc0ec68d2ad25144919af6dc81afc88cd05f01b401730bccc3086c9dd06d38ed522e52e7ffae7671898fb91cec0821c061aaea6c47ae877d2d7f5ca1ecf159e0ea152ce713f652c116f62e12cad293331db922a5fed311ab22096d90fc17ccc53f84d46eae680def0b9949e0d9debff263d575e590941a5ce0b33548beb6dbc01104f6054da73cc349625adece6a54e092d8d740915b91d81df30374a78693d6b69724f05354d61ac0febff4a544b88954d11d3f4927895edf6ad755313227ac87f24f12d70a831df16bd45c4a03570fdf27d698fa5581fce2d002890a3f2059a6bfdf77f0aeee3ad8318449bc1b2d486b225b148a78e921c73a2c37256dfb1ad611e410d5436e0d31d00ab5177da7915a74ef3307927c23c764f5cf62c3e2db86284c9abb39045b625d507f5c8d440557b4dad2a39593fbb572cce25a364aae44134fdd97ef0148690881bee42b6bd929f12cdf07996597a2a8366b12841f8fb8dfc0ece651756637b95c6bdb92320302805b4a700e7d3dfb0b8878862f400f8437a6c153b5fab40d30af07e73cf4345cb6fa81574018a7bc0e8789fae8b8560f4b93d413fa8e0e0218527ccb82873fc9da6cc34b6197c1d8bd9223ab7c4efb1f8cf021450037f4576934d83116655c120062fc3b912176fd395ccc792d492f2730465f8b4c68155b6ceb52e80742d2970e24004171f4685cd78467a4e943a0fecff66dffff10922d69236460dc37c1df9b19dded1ecb932dd8dd2045d2f8e8d3dfb6a83a65d6623553a2aed7a12b78effeeaa58eec84cdefc84923177afb7bd04f6fc3d3332d63ed5c5d6fe8820b9853e7615407eb23962f5232db44bc0267e7f07e47b158de0732a974b80aeb00ffeeca83d26fe21e487ea4472cd9048f942155784af8f68006cdb4286480a7ffa1ba6e93fe7fdb33283359d28bf9311dee59899e0e77aa113fadda21526c8e2bd60f21e182b735a5b0177fb95e948857c6c4ae391b2b4950a35b129e7bf25b7eb2c0857290c55f5d28b78ca1f39f0cd676610805b0a378647ae958182b26de1ddbf80e80d7ab1d2476086ed192e98bee0969bc0e8765278cb5570ccc29ac6d7298821bff4f85895deffcf4ce54a69878cfb41eade0d8703cbcff02352733ace2d800ba68b0fdcc52b94247ecacddf80ad228cf76eb547d276d0f6402054e34c3569e2b53ea3cbc54e49e099372cde3acd1ba47f836a765f855763a175a58ec4d6cecc72375da2d8c956c2868e77bfdb697182b554f0b743d7095cf13a3ba1d19e7590c281bd09ce235898a9682aacb5633b4fa4c3bdd71139c20c518b6a7651a47df7658a5a7ed41b3e7e43543d68c1dd4a5d01ec7e42cabdd6963db84f0d69b5a471ff8b929a8774baee39b14ab325af2ea7756c656c0135a59568499208341333d6b896cf0cc10108970e20313df241d179bd2a4d2392b269e6aeb9d2570bba7e3c67f49e90cf95562f93077a5fb588225724d444fcd8da55921dcff7b0be49ac0171ae98209e729f65bcebe447ccc0a185719f3fd55d1ae263daac4a420da91d05cdfc85d48e5743483dbb6fe81e5c216948953d95d5e725db17df44f05a57c6cc425e55572f9163e536a6d2d51d5213c937f6ddba08fc1f90ec73088a766a685f2c0d43b80422d48eef23b2ea588ea26b8dffb4f0df0cf91d6ea8f14a663ba2b165e4427010742fe63905d62b9dcf2385dce09fe75e4746d5c9c402ee77bfc9f39a28eb9f2751a81b090a499706accafbf5ae1afa9af350fd7481bb", 0x1000}, 0x1006) getpid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x2008000fffffffe) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) ioctl$RTC_VL_READ(r1, 0x80047013, 0x0) ptrace(0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f6465762f73726b99e8f9caefe6cbc171f6a2df1617"], &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='fuse\x00', 0x18000, &(0x7f0000000480)='ramfs\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) stat(0x0, &(0x7f0000000580)) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) dup(r4) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="000000000000000000000000001300"}, 0x1c) sendmmsg(r5, &(0x7f000000ac80), 0x800000000000273, 0x0) r6 = dup(0xffffffffffffffff) ioctl$TIOCMGET(r6, 0x5415, 0x0) 03:21:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00\x94u\xb7\xfbr\xf3\xf0\xaae\x8d\xa1\xa9%\x00\xb2\x1b\xb3o\xcbe\xa7\x8c\xd6\x1e\xc7p\x86\x8fG\xc1\xf8\xc6\xe5=+o\xac\xc3\xf0N\xca\xa5Zm\xc6\xa0\x110\xd2q\x98\xc5\xc3\xaa\x89\xc1\xce\xde\xf1\vp\xderD\xc6\xa2\xc2\xc3\xfc\xc7\x87\xf0O\xb8a\xd8\xef@uu\x1d\xef\xf7\x17@\x17\xf1\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x200000000038) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x20000000, 0x20000000, 0xf9}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 03:21:50 executing program 1: open(0x0, 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0) setns(r0, 0x0) clone(0x71064400, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/\x00'], 0x2) mount$fuse(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a04, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) 03:21:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:50 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000040)=""/54) [ 373.859749] ptrace attach of "/root/syz-executor.3"[13259] was attempted by "/root/syz-executor.3"[13261] 03:21:50 executing program 1: open(0x0, 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 373.900663] audit: type=1400 audit(1574133710.695:158): avc: denied { sys_admin } for pid=13257 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 03:21:50 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200055, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ed3b9788caa3d46, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f030002000000"}, 0xff) 03:21:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:50 executing program 1: open(0x0, 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 374.122013] IPVS: ftp: loaded support on port[0] = 21 [ 374.470135] net_ratelimit: 14 callbacks suppressed [ 374.470140] protocol 88fb is buggy, dev hsr_slave_0 [ 374.480230] protocol 88fb is buggy, dev hsr_slave_1 [ 374.800167] protocol 88fb is buggy, dev hsr_slave_0 [ 374.805365] protocol 88fb is buggy, dev hsr_slave_1 [ 374.950188] protocol 88fb is buggy, dev hsr_slave_0 [ 374.955353] protocol 88fb is buggy, dev hsr_slave_1 [ 375.190190] protocol 88fb is buggy, dev hsr_slave_0 [ 375.195353] protocol 88fb is buggy, dev hsr_slave_1 [ 376.550197] protocol 88fb is buggy, dev hsr_slave_0 [ 376.555353] protocol 88fb is buggy, dev hsr_slave_1 03:21:53 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) gettid() tkill(0x0, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:53 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'\x00', 0x400}) 03:21:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff50700000000000009f70000000000000950000800000000099e99031ba4c0af84cfca176fb423520d2feff6bf4aa35339f443783829e2bfddf65d128160f57bffa7663ae28d4ff07abd93e71db7156e5fe1a1196b3deeddcae2ff2ef1964da556ae52f211c3ff6f4da006c85e4de81d82839c38fd55255d1c4ee21dd49801cb1c9e61f312414082eea7b078c9f3db82e2c235fc09741c8c15031aa1be9f1ea881bcd2e290ede4786df11fedc7d4a01fb2c5cefc3d4d4141af540792bb69a61f952d0f88e148d51f91bfcbe145f19f30000928375"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r2) 03:21:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:53 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:53 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:53 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfb120eb7) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) 03:21:53 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) gettid() tkill(0x0, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[]}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:53 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(0x0, 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x20}}, 0x0) 03:21:54 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) gettid() tkill(0x0, 0x1004000000013) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:54 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(0x0, 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 377.225392] audit: type=1800 audit(1574133714.015:159): pid=13347 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17673 res=0 03:21:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x2, [{{0x2, 0x0, @dev}}]}, 0x3f9) 03:21:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[]}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 377.314554] audit: type=1800 audit(1574133714.095:160): pid=13357 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17680 res=0 03:21:54 executing program 4: pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x200000100000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x148, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r8, @ANYBLOB="00000000000000000e0012000000010073737400000002002c0208001900000000000200fe8000000000000000000000000000bb00000900290000000000020000000000020000000000000000003b7a8bd9d9c643a80000"], 0x38}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x0, 0x0, 0x0, {}, [@IFA_BROADCAST={0x8, 0x4, @dev}]}, 0x20}}, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) open(0x0, 0x0, 0x0) r9 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x1000000000000, 0x102, 0x1, 0x0, 0x6, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400400, 0x0, 0x1, 0x9, 0x2, 0x8}, 0x20) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r10, r10, &(0x7f00000002c0)=0x202, 0xdd) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r11, &(0x7f0000000140)=ANY=[], 0x4240a2a0) getpeername$packet(r11, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r12, 0x1, 0x0, 0x6, @random="0b2c85e062d8"}, 0x14) 03:21:54 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(0x0, 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000780), 0x4) 03:21:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[]}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:54 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:54 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 377.940405] audit: type=1800 audit(1574133714.735:161): pid=13375 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17671 res=0 03:21:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2, 0x0) getsockname$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, 0x0) unshare(0x40000000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000300)={'mangle\x00'}, &(0x7f0000000380)=0x54) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000003c0)={'raw\x00'}, &(0x7f00000004c0)=0x54) 03:21:54 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) [ 378.062107] audit: type=1800 audit(1574133714.795:162): pid=13384 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17675 res=0 03:21:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 378.167872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 378.187826] IPVS: ftp: loaded support on port[0] = 21 [ 378.195860] audit: type=1400 audit(1574133714.795:163): avc: denied { setopt } for pid=13372 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 378.230541] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. 03:21:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="e2644d7c7341e4eb3211334dce9bb8ad"}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 03:21:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:55 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:55 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 378.961699] audit: type=1800 audit(1574133715.755:164): pid=13422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17684 res=0 03:21:55 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x0, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) [ 379.061533] IPVS: ftp: loaded support on port[0] = 21 03:21:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:56 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) unlink(&(0x7f0000000080)='./bus\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00d\x88\xd2\xa0U\xdb\x1e\x00\x00\x00\x00\x00\x00\x00\x06\xed;\xfb^F\v\xa5\xc5\xd9\xb6>\x1dN') sendfile(r4, r5, 0x0, 0x320f) 03:21:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c6"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:56 executing program 4: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) close(r0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="0400cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2c65b6ae2e133d5f00003c1c12e2fc00", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r2], 0x2c}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[], 0x0, 0x120, 0xa55c91fed3cc2212}, 0x20) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 03:21:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:56 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 379.965700] audit: type=1800 audit(1574133716.755:165): pid=13447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17691 res=0 03:21:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c6"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:56 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) unlink(&(0x7f0000000080)='./bus\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00d\x88\xd2\xa0U\xdb\x1e\x00\x00\x00\x00\x00\x00\x00\x06\xed;\xfb^F\v\xa5\xc5\xd9\xb6>\x1dN') sendfile(r4, r5, 0x0, 0x320f) [ 380.019653] ptrace attach of "/root/syz-executor.4"[13451] was attempted by "/root/syz-executor.4"[13453] 03:21:56 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000000c0)=0x1, 0x4) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) 03:21:56 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x0, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:56 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000180)={{{@in=@initdev, @in=@dev}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_VFINFO_LIST={0x1c}]}, 0xfdbf}}, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000500)=0x5, 0x4) sendto$inet(r3, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 03:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c6"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:57 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRES64, @ANYPTR64, @ANYRES64=0x0, @ANYRESDEC=r3]]], 0x8) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe0700000000000700ff3f03000000450001070000001419001a000400021007", 0x29}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:57 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 380.411776] selinux_nlmsg_perm: 997 callbacks suppressed [ 380.411787] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 [ 380.439595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 03:21:57 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x0, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) [ 380.476387] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 [ 380.488849] audit: type=1800 audit(1574133717.265:166): pid=13502 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17667 res=0 03:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 380.522109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 [ 380.555725] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 [ 380.588030] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 [ 380.618786] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 03:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 380.632064] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 [ 380.645554] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 [ 380.658809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13489 comm=syz-executor.2 [ 380.710112] net_ratelimit: 14 callbacks suppressed [ 380.710118] protocol 88fb is buggy, dev hsr_slave_0 [ 380.720237] protocol 88fb is buggy, dev hsr_slave_1 03:21:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 381.030220] protocol 88fb is buggy, dev hsr_slave_0 [ 381.035436] protocol 88fb is buggy, dev hsr_slave_1 03:21:57 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="e6c55c3df4e86601000000010000009b2861343d72748d52864e01000000002ee70a67757310554a9ca66864eef1c8c72be40825f38b6c78f0bebc3176300000000400000000000000bc31810c25a2fc4d1153e55bc2fdfd711337bf1a3014f87159f469c30ae6b94f07fefb66764d49d14ae837f703000000acb50755821f9e16dfd1238029707d454e3132d8f04ca925b973fac1aa073d84803f64ca1aadc41265c7ea6a2c28cc883a83a9e8f56309733a60a6a34f5869e70930be77ff38878b3920b9268f3106095fefea61f09c721a983f052d8df3816f3155469a4a06157c6582d0377072"], 0x0, 0xe7}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:21:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 381.190104] protocol 88fb is buggy, dev hsr_slave_0 [ 381.195330] protocol 88fb is buggy, dev hsr_slave_1 [ 381.256425] ptrace attach of "/root/syz-executor.4"[13535] was attempted by "/root/syz-executor.4"[13536] 03:21:58 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000001080)=@un=@abs={0x1}, 0x80) bind(r2, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2, 0x3, {0xa, 0x4e23, 0x2, @loopback, 0x8}}}, 0x80) write(r1, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, &(0x7f0000000240)) r4 = dup(r3) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x2f6}}, 0x1) ioctl$FS_IOC_SETFLAGS(r4, 0x40046602, &(0x7f0000000640)=0x1) r6 = inotify_init() lseek(r6, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x0) r7 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x0, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0x100000031, &(0x7f0000000140), 0xfd73) recvmsg(r7, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2002) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, 0x0) fcntl$dupfd(r8, 0x0, r8) r9 = dup2(0xffffffffffffffff, r8) ioctl$TCSETSW(r9, 0x5403, &(0x7f0000000340)={0x3f, 0x200100, 0x0, 0x1, 0x16, 0x1, 0x0, 0x0, 0x8000, 0x0, 0x2}) getsockname(r9, &(0x7f00000001c0)=@rc, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x210000000013, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_int(r10, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x142) bind$inet(r10, 0x0, 0x0) connect$inet(r10, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r10, 0x6, 0x16, &(0x7f0000000000), 0x0) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r10, r10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7ff) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:21:58 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:58 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x0, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:58 executing program 4: r0 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) close(r0) io_setup(0x40000000085, &(0x7f0000000040)=0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x10000}]) 03:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 381.392059] audit: type=1800 audit(1574133718.185:167): pid=13547 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17720 res=0 [ 381.430135] protocol 88fb is buggy, dev hsr_slave_0 [ 381.435372] protocol 88fb is buggy, dev hsr_slave_1 03:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:58 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:58 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x0, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:58 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x0, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:58 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x11, 0x2, 0x8020003) r2 = open(&(0x7f00000008c0)='./bus\x00', 0x20143002, 0x0) sendfile(r2, r2, 0x0, 0x2008000fffffffe) 03:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 381.962690] audit: type=1800 audit(1574133718.745:168): pid=13576 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17712 res=0 03:21:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:58 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) splice(r1, &(0x7f0000000040), r0, 0x0, 0x9, 0x0) 03:21:59 executing program 4: clock_nanosleep(0xc, 0x0, 0x0, 0x0) 03:21:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:59 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$P9_RLOCK(r1, &(0x7f0000000140)={0x8}, 0x8) ftruncate(r1, 0x108200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x4000, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) sendfile(r1, r2, 0x0, 0xffffffff) 03:21:59 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 382.344682] audit: type=1800 audit(1574133719.135:169): pid=13609 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17714 res=0 03:21:59 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:59 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x0, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:21:59 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x2, 0x5, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x38}}, 0x0) 03:21:59 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000002000010000000000000000000200000000000001"], 0x1}}, 0x0) r4 = dup2(r3, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:21:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:59 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:21:59 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 382.790123] protocol 88fb is buggy, dev hsr_slave_0 [ 382.795350] protocol 88fb is buggy, dev hsr_slave_1 03:21:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:59 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 382.891988] audit: type=1800 audit(1574133719.685:170): pid=13627 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17724 res=0 [ 382.927634] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 03:21:59 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000500)={&(0x7f0000fee000/0x8000)=nil, 0x8000}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r1, 0x0) fchdir(r0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) writev(r2, &(0x7f00000003c0), 0x63) 03:21:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:21:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:21:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:22:00 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a029"], 0x1}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:22:00 executing program 2: capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000000)) creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) getxattr(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000140)=@random={'user.', '/dev/ptmx\x00'}, 0x0, 0x0) 03:22:00 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:00 executing program 4: capset(&(0x7f00000fc000)={0x800000019980330}, &(0x7f000047efe8)) prctl$PR_CAPBSET_DROP(0x18, 0x0) 03:22:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:22:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:22:00 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x2, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:22:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 383.896868] audit: type=1800 audit(1574133720.685:171): pid=13670 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16628 res=0 03:22:00 executing program 4: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={0x77359400}, 0x10) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r4 = gettid() recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x4000000000000c1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x1004000000013) 03:22:00 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x8001000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r4, 0x0, 0x20008) [ 383.957795] ptrace attach of "/root/syz-executor.2"[13681] was attempted by "/root/syz-executor.2"[13683] 03:22:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:22:01 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f00000001c0)='kuy\x85ing\xff', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) 03:22:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, 0x0, 0x0) 03:22:01 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, 0x0, 0x0) 03:22:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 384.768871] audit: type=1800 audit(1574133721.555:172): pid=13708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17026 res=0 03:22:01 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf", 0x7c}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0, 0xfffffffffffffee5}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 03:22:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, 0x0, 0x0) 03:22:01 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(0xffffffffffffffff, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:01 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000040)=""/28) ptrace$peek(0x1, 0xffffffffffffffff, &(0x7f00000000c0)) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = syz_open_procfs(0x0, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000280)=0x80000000) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000540)=@generic={0x3}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[0xe0ffffff, 0x3], [], @local}}, 0x1c) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000000301ffff808fc201000000000000101ba119062e9eab80cc3321f24b5548de49ba05000000000000008d4929c15da7a001df107fe5dfd1fe0d579716aec342db43f69da4c089cea582ff010001000000000000ad56b2b57191d13df8298ff323554dcaf63454e1a5355cb88b2dd2417c5d98941c1082d3f3099a5513f4bd651edca0afb4b43bcbafb291e992d7db98f5ebdd030708870ac5d37fa5feffffffff00000000a309d2a73c7bc5f78cd3df6f2960b9277e0372710f84a983e27dfb2a6d781c93e5ebd4995597edadcbce8877eba8772175e4000000004d58a8f3c3a6cdff46be6f50c6022a64b28f0b435023152d0787cf7872ced3e6d0a4b49e343a6d9b2ad96404bfd3b88be36679b5e7277202a6600d7a091424f74c75e1720f90faa1baec410cdcda95004a9e0100000000000000393137ffab41f994e8989a4237d163850ae6aeb829f2fa5624dab179bde5b2b1a94638b997c05b1ae1750f4b4271546b1d972e00ee30325087d73dd2d7bb67974cbe573cb33db6c63f0329beac75f98174f392dfa0fdd7781a35f93fd317c57056d4dd2e20814ef00adba9d432b60aea8dff47a06ff58179e35978c704306bddc3a18318458bf6372631abad07bccc69e99df12b2ae8e986b774bb569418c52bf04ac3f819eec4463c9fbc0f8642a7db4b83cdf2e015c6f638f049598d9fbf04beb63fa6ff942d9e959b5680c464b9b2ec83321b9f43bd649d9e6da218cef73f0170338c38339aa97805069832c0edbd75a39fb376fc2971c5c1d5cf8626108b520fad5eba4ac95a58b045218dd41f2496c856046a5f4445b1674f7afb0039942eda41ce1b387f4733af8a45bc76c18d4b70a2b4dee692cd2660a50b6c34d390b5f839930fbf830b95e1cbf3361c7a57ad9eb4a2875c4bf8bbfee2528d28c9000091830c347f14cfb85addbb538f0df08412716e41a91f27550547da0334365fe7af0000000000000000000041e0f17c10f07f3cee4817a577ec74b8d78fefe82b163ec6527f1c48b75b6f2069d2c1f81c7c7d392c7cb93bb8739d1a765e544ff3b3aa77aab09df33636"], 0x29d}}, 0x0) recvmmsg(r4, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) [ 384.923098] audit: type=1800 audit(1574133721.705:173): pid=13726 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16993 res=0 [ 384.951223] ptrace attach of "/root/syz-executor.2"[13730] was attempted by "/root/syz-executor.2"[13731] [ 385.022365] audit: type=1800 audit(1574133721.805:174): pid=13740 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17121 res=0 03:22:02 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r5 = dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}, 0x0) 03:22:02 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:02 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) dup2(r2, r1) 03:22:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}, 0x0) 03:22:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 385.650130] audit: type=1800 audit(1574133722.435:175): pid=13758 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17249 res=0 03:22:02 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}, 0x0) [ 385.766430] audit: type=1800 audit(1574133722.555:176): pid=13773 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17266 res=0 03:22:02 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:02 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x5, 0x1f3}) readv(r0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000001480)=""/25, 0x19}], 0x2) [ 385.886963] audit: type=1800 audit(1574133722.675:177): pid=13785 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17137 res=0 03:22:03 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x8}, 0x0) 03:22:03 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000), 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:03 executing program 2: capset(&(0x7f0000000800)={0x20080522}, &(0x7f0000000840)) r0 = socket(0xa, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) [ 386.311893] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 386.328487] audit: type=1800 audit(1574133723.115:178): pid=13799 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17457 res=0 03:22:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:03 executing program 2: r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000d52ff0)="010000000000060000071a80000001cc", 0x3d9) 03:22:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) dup3(0xffffffffffffffff, r2, 0x0) 03:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x8}, 0x0) 03:22:03 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000), 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) dup3(0xffffffffffffffff, r2, 0x0) 03:22:03 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000), 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 386.564272] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:22:03 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x8}, 0x0) 03:22:03 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000100)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) wait4(0x0, 0x0, 0x0, 0x0) 03:22:03 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) dup3(0xffffffffffffffff, r2, 0x0) [ 386.749704] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 386.780009] ptrace attach of "/root/syz-executor.2"[13840] was attempted by "/root/syz-executor.2"[13841] [ 386.950137] net_ratelimit: 14 callbacks suppressed [ 386.950142] protocol 88fb is buggy, dev hsr_slave_0 [ 386.960582] protocol 88fb is buggy, dev hsr_slave_1 [ 387.270322] protocol 88fb is buggy, dev hsr_slave_0 [ 387.275476] protocol 88fb is buggy, dev hsr_slave_1 03:22:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 03:22:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:22:04 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="b7000000005e1c04650000000000000095000040000000002d604796cf1ba3e7b0c3881b1cee7060da5aa451074e93787fafe54b970e7fb365d748e7695d4768902cd9cdab0b5c335736292da1eeea6a0300156f0da515b48eb4731c057410dd95ad567826014ae3094162ff4499c5066e5480f4b4d02ad9d618ba6c14f42ea7ac1b23eb206f91cfa8df3c3e0466ace0e3765c618116ec896a6d55c0"], &(0x7f0000000140)='GPL\x00', 0x1, 0xc3, &(0x7f0000000240)=""/195}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000006c0)=r0, 0x4) sendmmsg(r2, &(0x7f00000021c0)=[{{0x0, 0xff48, 0x0}}], 0x400000000000284, 0x2000850) [ 387.415439] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 387.427690] kauditd_printk_skb: 3 callbacks suppressed [ 387.427710] audit: type=1800 audit(1574133724.215:182): pid=13853 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17649 res=0 [ 387.433715] protocol 88fb is buggy, dev hsr_slave_0 03:22:04 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) [ 387.433771] protocol 88fb is buggy, dev hsr_slave_1 03:22:04 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 03:22:04 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffce5, &(0x7f0000000340)=[{&(0x7f0000000280)="240000001e007be11dfffd946f610500020000061f00000000000800080018000400ff7e", 0x37f}], 0x1}, 0x0) [ 387.543000] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:22:04 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:04 executing program 2: creat(&(0x7f0000000140)='./bus\x00', 0x12) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/4\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0x2b7}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/4\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, 0x0, 0x4011) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0), 0x4) sendto$inet(r4, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) recvmmsg(r4, &(0x7f0000003a40), 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r5+30000000}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r6 = socket$packet(0x11, 0x40800000000003, 0x300) ppoll(&(0x7f0000000140)=[{r6}], 0x1, 0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, 0x0, 0x153) sendto$inet6(r6, &(0x7f0000000040)="0104000073d1600000000000fbf55b42b90516db4d916502c555cf09570300a44b29d9fde6ea94211af8e74bab5b98aa9d89060000c846781d1aab3668c64de00004000000711608f2003ee478efddfc86a15aaaf3cd1ad1dfff004000000033e065b42ba58f7599e526b9ac", 0x321, 0x4000000, 0x0, 0x73) r7 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r7, 0x107, 0xf, &(0x7f0000000000)=0x100, 0x4) bind$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)="0104000073d1600000000000fbf55b42b90516db4d916502c555cf09570300a44b29d9fde6ea94211af8e74bab5b98aa", 0x30, 0x0, 0x0, 0x0) splice(r6, &(0x7f0000000180), r7, &(0x7f00000001c0)=0x60, 0x3ff, 0x0) r8 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) [ 387.621648] audit: type=1800 audit(1574133724.355:183): pid=13867 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17282 res=0 [ 387.670146] protocol 88fb is buggy, dev hsr_slave_0 [ 387.675339] protocol 88fb is buggy, dev hsr_slave_1 [ 387.697226] audit: type=1800 audit(1574133724.465:184): pid=13880 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17489 res=0 03:22:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}, 0xfffffffd}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:22:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 03:22:05 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:05 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x5c, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}}, [@policy_type={0xc}]}, 0x5c}, 0x8}, 0x0) 03:22:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 03:22:05 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 388.349040] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 388.366308] audit: type=1800 audit(1574133725.155:185): pid=13900 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17734 res=0 03:22:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 03:22:05 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, 0x0, 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}}}, 0x50}, 0x8}, 0x0) [ 388.456107] audit: type=1800 audit(1574133725.245:186): pid=13910 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17732 res=0 [ 388.486607] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 388.554934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 388.573072] audit: type=1800 audit(1574133725.365:187): pid=13921 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17734 res=0 03:22:05 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0x331}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="f7d40f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[], 0x0, 0xbb}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 389.030118] protocol 88fb is buggy, dev hsr_slave_0 [ 389.035367] protocol 88fb is buggy, dev hsr_slave_1 03:22:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 03:22:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}}}, 0x50}, 0x8}, 0x0) 03:22:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:05 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, 0x0, 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:05 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="100100001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000f00012000800010073697400e40002000800050002000000080012004e240000080011004e210000080004001f0000000800100008000000080012004e240000080012004e200000080011004e24000008000400c700000014000300000000000000000000000000000000001400020000000000000000000000ffffac1414bb14000300ff01000000000000000000000000000108000200", @ANYRES32=r5, @ANYBLOB="28000f0000000000080005001f000000080011004e220000080004000300000008000f0003000000080011004e220000080011004e210000260010000300000014000200158efdf134b10921000000e4000000aa"], 0x110}}, 0x0) 03:22:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000022000104000000000000000000000000e631ce2663708640e675ce7e7d16ba466816028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008e2edee71afd3e9da27aa7c8d500008032648039d1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8f6ccfed3d54a9a5f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b312d4f4e6030730b55b97987961c4e31c5d28f9c07cbf04fa35ed245aae47bbabbe151a833b3e455d8fd6aa36f155ccc6a9c7b6ada7ec768986aeb3b71bb756e97e5ca528901ccdcacff1ce6fa73edd3ad8547ba449ddc5a916532a4ad31854ff7c61ba545063c0e38dd7fa412f0dabc6d2825e8edf4359e1ae7a599335cbcae39749632c45911dcb5e92c81f0dd3e3288a19633df408a51f58687f9329d49a138ecfff5b7de17f822f0ae667559d4f1faf7d320bcec0f68427b2e78278fd9a88a5537bf5297de9fab64f316b44bfab8591c18c9cd8ad42117d1471e04b28ae15118e5b94158f4069b2d910ad48e8d5fc9eb8575d3668595378ef560cfa89471310e097faa8db245a147d3865205d530b22784a65cd407583b9b0b16c5a068b3ba5a02f7b6a9cad1fd784b564500c79a4aecb6653354883b0ab6e6f2182bae09d1bb6e361db9966fae64eaad478d87a45363be15f1a0297a"], 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=@delpolicy={0x50, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@rand_addr="e32cb1c2d12ea067a80d04e434758857"}}}, 0x50}, 0x8}, 0x0) [ 389.213294] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 389.241379] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 03:22:06 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, 0x0, 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 389.252556] audit: type=1800 audit(1574133726.025:188): pid=13948 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17473 res=0 03:22:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:06 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:06 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0x10000000000000f, &(0x7f0000000240)="ff21b3d0", 0x4) [ 389.365201] audit: type=1800 audit(1574133726.155:189): pid=13963 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17489 res=0 03:22:06 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:06 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 389.453324] audit: type=1800 audit(1574133726.235:190): pid=13973 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16834 res=0 [ 389.523237] audit: type=1800 audit(1574133726.315:191): pid=13980 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17728 res=0 03:22:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:06 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:06 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x3, 0x0) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000180)=""/166, 0xa6) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000180)=""/166, 0xa6) dup2(r1, r3) 03:22:06 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:06 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 03:22:06 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+30000000}}, 0x0) r1 = gettid() tkill(r1, 0x14) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 03:22:06 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 03:22:07 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 03:22:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:07 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x14, 0x16, [{0x10, 0x1, [@IFLA_VF_TX_RATE={0xc}]}]}, @IFLA_GROUP={0x8}]}, 0x3c}}, 0x0) 03:22:07 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:07 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:07 executing program 2: 03:22:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:07 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:08 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x1, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x5c, 0x0, &(0x7f0000000340)=[@enter_looper, @acquire, @release, @register_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 03:22:08 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:08 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 03:22:08 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[], 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:08 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:08 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:08 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:08 executing program 2: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) pselect6(0xffe4, &(0x7f0000000040), &(0x7f0000000080)={0x10000000020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd2}, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:22:08 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[], 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:08 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) [ 391.842798] ptrace attach of "/root/syz-executor.2"[14086] was attempted by "/root/syz-executor.2"[14088] 03:22:08 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[], 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:09 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:09 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:09 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:09 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:09 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 392.621321] kauditd_printk_skb: 10 callbacks suppressed [ 392.621330] audit: type=1800 audit(1574133729.415:202): pid=14111 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17757 res=0 03:22:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) dup3(0xffffffffffffffff, r1, 0x0) 03:22:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 392.705339] audit: type=1800 audit(1574133729.495:203): pid=14122 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17757 res=0 03:22:09 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 392.848707] audit: type=1800 audit(1574133729.635:204): pid=14137 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17757 res=0 [ 393.200113] net_ratelimit: 15 callbacks suppressed [ 393.200118] protocol 88fb is buggy, dev hsr_slave_0 [ 393.210778] protocol 88fb is buggy, dev hsr_slave_1 03:22:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) dup3(0xffffffffffffffff, r1, 0x0) 03:22:10 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab929"], 0xeb) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:10 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:10 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab929"], 0xeb) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) dup3(0xffffffffffffffff, r1, 0x0) [ 393.487592] audit: type=1800 audit(1574133730.275:205): pid=14149 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17772 res=0 [ 393.520363] protocol 88fb is buggy, dev hsr_slave_0 [ 393.527044] protocol 88fb is buggy, dev hsr_slave_1 03:22:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:10 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab929"], 0xeb) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 393.598064] audit: type=1800 audit(1574133730.385:206): pid=14161 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17770 res=0 03:22:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r1, 0x0) 03:22:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 393.670155] protocol 88fb is buggy, dev hsr_slave_0 [ 393.675285] protocol 88fb is buggy, dev hsr_slave_1 03:22:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) [ 393.725380] audit: type=1800 audit(1574133730.515:207): pid=14173 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17767 res=0 03:22:10 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c"], 0x160) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r1, 0x0) [ 393.853152] audit: type=1800 audit(1574133730.645:208): pid=14184 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17775 res=0 [ 393.910129] protocol 88fb is buggy, dev hsr_slave_0 [ 393.915263] protocol 88fb is buggy, dev hsr_slave_1 03:22:11 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x160) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:11 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="ba"], 0x1) 03:22:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r1, 0x0) 03:22:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r1, 0x0) [ 394.394966] audit: type=1800 audit(1574133731.185:209): pid=14202 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17779 res=0 03:22:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:11 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x160) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r1, 0x0) 03:22:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r1, 0x0) 03:22:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 394.561437] audit: type=1800 audit(1574133731.345:210): pid=14221 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17766 res=0 03:22:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:11 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x19b) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:12 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x0) 03:22:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 395.270185] protocol 88fb is buggy, dev hsr_slave_0 [ 395.275372] protocol 88fb is buggy, dev hsr_slave_1 03:22:12 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x19b) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) [ 395.304254] audit: type=1800 audit(1574133732.095:211): pid=14245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17803 res=0 03:22:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r1, 0x0) 03:22:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:12 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x19b) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 03:22:12 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x0) 03:22:12 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1b8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 03:22:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 03:22:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:13 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1b8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:13 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:13 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, 0x0, 0x0) 03:22:13 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1b8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x0, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:13 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:13 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1c7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:13 executing program 2: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x0, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:13 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:13 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f"], 0x1c7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:13 executing program 2: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) [ 399.430144] net_ratelimit: 14 callbacks suppressed [ 399.430148] protocol 88fb is buggy, dev hsr_slave_0 [ 399.440194] protocol 88fb is buggy, dev hsr_slave_1 [ 399.750221] protocol 88fb is buggy, dev hsr_slave_0 [ 399.755381] protocol 88fb is buggy, dev hsr_slave_1 [ 399.910175] protocol 88fb is buggy, dev hsr_slave_0 [ 399.915327] protocol 88fb is buggy, dev hsr_slave_1 03:22:16 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x0) 03:22:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x0, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:16 executing program 2: r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:16 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1c7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:16 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, 0x0, 0x0) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 400.084522] kauditd_printk_skb: 7 callbacks suppressed [ 400.084529] audit: type=1800 audit(1574133736.875:219): pid=14356 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17823 res=0 03:22:16 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:17 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1ce) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 400.150145] protocol 88fb is buggy, dev hsr_slave_0 [ 400.155374] protocol 88fb is buggy, dev hsr_slave_1 03:22:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 400.268427] audit: type=1800 audit(1574133737.055:220): pid=14376 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17819 res=0 03:22:17 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x0) 03:22:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:17 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:17 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1ce) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:17 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:17 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:17 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1ce) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 400.989289] audit: type=1800 audit(1574133737.775:221): pid=14390 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17827 res=0 03:22:17 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:17 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53"], 0x1d2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 401.102294] audit: type=1800 audit(1574133737.885:222): pid=14405 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17831 res=0 [ 401.200234] audit: type=1800 audit(1574133737.985:223): pid=14415 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17826 res=0 [ 401.510156] protocol 88fb is buggy, dev hsr_slave_0 [ 401.515269] protocol 88fb is buggy, dev hsr_slave_1 03:22:18 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x0) 03:22:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:18 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:18 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1d2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:19 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1d2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 402.193961] audit: type=1800 audit(1574133738.985:224): pid=14427 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17832 res=0 03:22:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:19 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) [ 402.319293] audit: type=1800 audit(1574133739.105:225): pid=14435 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17834 res=0 03:22:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:19 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) 03:22:19 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:19 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1d4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:19 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1d4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r2, 0x0) [ 403.144523] audit: type=1800 audit(1574133739.935:226): pid=14467 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17840 res=0 03:22:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:20 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) [ 403.221801] audit: type=1800 audit(1574133740.005:227): pid=14472 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17843 res=0 03:22:20 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1d4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 403.365449] audit: type=1800 audit(1574133740.155:228): pid=14488 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17833 res=0 03:22:20 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) 03:22:20 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 03:22:20 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:20 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:20 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r3, r2, 0x0) 03:22:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:20 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:21 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r2+30000000}}, 0x0) r3 = gettid() tkill(r3, 0x1004000000013) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) 03:22:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:21 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x0, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:21 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:22 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x0, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 405.177920] kauditd_printk_skb: 3 callbacks suppressed [ 405.177929] audit: type=1800 audit(1574133741.965:232): pid=14535 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17857 res=0 03:22:22 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000140), 0x4) 03:22:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x0, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 405.354140] audit: type=1800 audit(1574133742.125:233): pid=14550 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17833 res=0 [ 405.670199] net_ratelimit: 14 callbacks suppressed [ 405.670204] protocol 88fb is buggy, dev hsr_slave_0 [ 405.680580] protocol 88fb is buggy, dev hsr_slave_1 03:22:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140), 0x4) 03:22:22 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:22 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) [ 405.990386] protocol 88fb is buggy, dev hsr_slave_0 [ 405.995937] protocol 88fb is buggy, dev hsr_slave_1 03:22:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:22 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 406.058827] audit: type=1800 audit(1574133742.845:234): pid=14571 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17861 res=0 03:22:22 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140), 0x4) 03:22:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:23 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') [ 406.150135] protocol 88fb is buggy, dev hsr_slave_0 [ 406.155291] protocol 88fb is buggy, dev hsr_slave_1 03:22:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000140), 0x4) 03:22:23 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) socket$inet6(0xa, 0x0, 0x0) [ 406.246265] audit: type=1800 audit(1574133742.965:235): pid=14585 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17819 res=0 03:22:23 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 03:22:23 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="70512a1d7dbd6cfef178c977b28b6e2c955e2c9c025d17048694265606ff757eb1fad843322307c10cd038e5ecc93b267757a785ff55d1487b63e0767c3ce479eace211d522584a6bff3e3d7d3829404cd757c9b6f72f9628d01004bff4a8ccdb763671ca13de7040000000000000000b839d2c408ac72fa0a483109cd789bf01a674bf309c245c2d00600000000000000e468b4ea9c45b621058923eda2a4592bb41c55d33af63c0d00000080032161f23eaad22d538d608949f220bfd817a3b4955d3271cf6dd7620b30a83a8bf3cc405d1f824d8339068fcfe906cb899c886446c44d244de92e1ab9291b43219a7b7711c71fa503000073a4096fef0000000000d8be2c547d56e691a77a69709efe8dc2c6133c926d1137bcca392089438e9eff7fde6d94429279515434b418ebdbe36ea3baf400bed706d9cc2cf0515da3ce4f028ffb2dab3d545b9172eab43e595681a09eae5d9e95f09251a6144eb15c43548e2f2ed38c6384fe1dbe8e5011433029bdd05a000000000000000000000000000000074f96ab4aa860ac705f3835935b10cb45e4cb10f9782c097114b3624c9c8863b23f453c2468a7644d519d9e2fef0273e12da9251610c83145f7864c54c36b2b4cab5f6f655c35af3bdbecf47f53a579cb"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, 0xffffffffffffffff, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') 03:22:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) [ 406.338761] audit: type=1800 audit(1574133743.075:236): pid=14597 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17870 res=0 03:22:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 406.390139] protocol 88fb is buggy, dev hsr_slave_0 [ 406.397941] protocol 88fb is buggy, dev hsr_slave_1 03:22:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, 0x0, 0x0) 03:22:23 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 406.441613] audit: type=1800 audit(1574133743.235:237): pid=14613 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17791 res=0 03:22:23 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(0x0, &(0x7f0000000000)='./file1\x00') 03:22:23 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 03:22:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, 0x0, 0x0) 03:22:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:23 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) [ 406.653377] audit: type=1800 audit(1574133743.445:238): pid=14637 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17870 res=0 03:22:23 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(0x0, &(0x7f0000000000)='./file1\x00') 03:22:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, 0x0, 0x0) 03:22:23 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x0, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 406.766155] audit: type=1800 audit(1574133743.555:239): pid=14647 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17852 res=0 03:22:23 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x0, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:23 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(0x0, &(0x7f0000000000)='./file1\x00') 03:22:23 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) memfd_create(&(0x7f0000000700)='/dev/ful\xbb.\xddq\xafb\xd3\x91\x85\xa0\xc1l\x00', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) socket$inet6(0xa, 0x2, 0x0) 03:22:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:23 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x0, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) [ 406.937947] audit: type=1800 audit(1574133743.725:240): pid=14665 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17836 res=0 03:22:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:23 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', 0x0) 03:22:23 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:23 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) socket$inet6(0xa, 0x2, 0x0) 03:22:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 407.060174] audit: type=1800 audit(1574133743.845:241): pid=14675 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=17854 res=0 03:22:23 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', 0x0) 03:22:23 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, 0x0, 0x0) 03:22:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r4, r2, 0x0) 03:22:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'ip6gretap0\x00', &(0x7f0000000140)=@ethtool_ts_info={0x41, 0x9, 0x1, 0x9, [0x9, 0x0, 0x6], 0x0, [0x566fd028, 0x0, 0x8]}}) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x9) ioctl$TCSETX(0xffffffffffffffff, 0x5433, &(0x7f0000000080)={0x1c0, 0x0, [0x0, 0x0, 0x0, 0x275c, 0xff], 0x1}) socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x4001, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) 03:22:24 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:24 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000424, 0x4) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0xfec) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', 0x0) 03:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 03:22:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:24 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, 0x0, 0x0) 03:22:24 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 03:22:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:24 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'ip6gretap0\x00', &(0x7f0000000140)=@ethtool_ts_info={0x41, 0x9, 0x1, 0x9, [0x9, 0x0, 0x6], 0x0, [0x566fd028, 0x0, 0x8]}}) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x9) ioctl$TCSETX(0xffffffffffffffff, 0x5433, &(0x7f0000000080)={0x1c0, 0x0, [0x0, 0x0, 0x0, 0x275c, 0xff], 0x1}) socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x4001, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@multicast1]}, {}]}]}}}}}}}, 0x0) 03:22:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 03:22:24 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:24 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:24 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) 03:22:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) 03:22:24 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) socket$inet6(0xa, 0x2, 0x0) [ 407.750157] protocol 88fb is buggy, dev hsr_slave_0 [ 407.755308] protocol 88fb is buggy, dev hsr_slave_1 03:22:24 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) 03:22:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:24 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) getsockname(r2, 0x0, 0x0) 03:22:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x807) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r4, 0xffffffffffffffff, 0x0) 03:22:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) gettid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x30], 0x2d, [0x0, 0x119fd552c2434261]}}}]}}) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xebb4fd3d) r1 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) lseek(r1, 0x258, 0x3) 03:22:24 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) getsockname(r2, 0x0, 0x0) 03:22:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x4fff}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) close(r0) 03:22:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='127.+.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[]) creat(0x0, 0x0) open(0x0, 0x0, 0x0) 03:22:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) getsockname(r2, 0x0, 0x0) 03:22:25 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000001580)=""/4101, 0x1005}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 408.189498] 9pnet: p9_fd_create_tcp (14789): problem connecting socket to 127.0.0.1 [ 408.225388] 9pnet_virtio: no channels available for device 127.+.0.1 03:22:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:25 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r2, r0, 0x0) 03:22:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(0xffffffffffffffff, 0x0, 0x0) [ 408.253611] 9pnet_virtio: no channels available for device 127.+.0.1 03:22:25 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='./file1/file0\x00') 03:22:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) gettid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x30], 0x2d, [0x0, 0x119fd552c2434261]}}}]}}) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xebb4fd3d) r1 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) lseek(r1, 0x258, 0x3) 03:22:25 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:22:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(0xffffffffffffffff, 0x0, 0x0) 03:22:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000006c0)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x7}}]}, 0x34}}, 0x0) 03:22:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(0xffffffffffffffff, 0x0, 0x0) 03:22:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:25 executing program 3: r0 = socket(0x2, 0x1, 0x0) listen(r0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000009ff4)={0x10000014}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000007ffc), 0x2f5) 03:22:25 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:22:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r1, 0x0, 0x0) 03:22:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet_int(r2, 0x0, 0x15, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 03:22:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 409.053055] 9pnet: p9_fd_create_tcp (14844): problem connecting socket to 127.0.0.1 [ 409.212663] ptrace attach of "/root/syz-executor.4"[14863] was attempted by "/root/syz-executor.4"[14865] 03:22:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) gettid() perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x30], 0x2d, [0x0, 0x119fd552c2434261]}}}]}}) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xebb4fd3d) r1 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) lseek(r1, 0x258, 0x3) 03:22:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r1, 0x0, 0x0) 03:22:26 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 03:22:26 executing program 3: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000480)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x9cX7\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\xad\xcb\x859\xca\x1d*e7\f=v \xb6\x990:\xa4\xc2R|\xb9ZOYf\r3\x8e\x01\xa3gl\x1b=\xde\xd9\xc4K\x00\xd6\x12\xd6\x17\xaf\x1f\x98\xd8\xab4V\xb4\xbb\x8b\x95o\xdd\xd8\x1b\t@A\xc4\xc5\xfc\xdeZc\xefK\xf9\xcb\xa0\xf8+\xd1\x99[\xfb\xd1/\x8e\xf1\xd4\xe0NzX\x1c\xc9\xd3\xbb\xd1\x86\xd9\aS\x10~\xf1\xe5@I\xc5\xf7\x86\xa4', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r4, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x2003, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r5, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 03:22:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:26 executing program 4: r0 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x4000000000020009) r2 = socket$inet6(0xa, 0x400000000001, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x0) eventfd(0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) 03:22:26 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 03:22:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r1, 0x0, 0x0) 03:22:26 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x34, 0x0, 0x0, 0x7}, {0x80000006}]}, 0x10) 03:22:26 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 03:22:26 executing program 5: mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:26 executing program 1: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) r1 = socket$netlink(0x10, 0x3, 0xd) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0}, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000580)='\x00', 0x1, 0x20000084, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x4, 0x7ffffffc, 0x0, 0xffffffff}, 0x14) shutdown(r0, 0x2) 03:22:26 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r0, 0x0, 0x0) 03:22:26 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 03:22:26 executing program 5: mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:26 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x21000) close(0xffffffffffffffff) [ 410.044235] 9pnet: p9_fd_create_tcp (14905): problem connecting socket to 127.0.0.1 [ 410.501066] kauditd_printk_skb: 6 callbacks suppressed [ 410.501075] audit: type=1804 audit(1574133747.295:248): pid=14883 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir399670859/syzkaller.NoCSq0/328/bus" dev="sda1" ino=17895 res=1 [ 410.533438] audit: type=1804 audit(1574133747.295:249): pid=14883 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir399670859/syzkaller.NoCSq0/328/bus" dev="sda1" ino=17895 res=1 [ 410.561055] audit: type=1804 audit(1574133747.325:250): pid=14936 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir399670859/syzkaller.NoCSq0/328/bus" dev="sda1" ino=17895 res=1 03:22:27 executing program 4: 03:22:27 executing program 5: mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:27 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r0, 0x0, 0x0) 03:22:27 executing program 2: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x120000003}) epoll_pwait(r1, &(0x7f0000000100), 0x11c, 0xfff7ffbf, 0x0, 0xffffffffffffff21) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)={0x2001}) 03:22:27 executing program 3: 03:22:27 executing program 1: 03:22:27 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r0, 0x0, 0x0) 03:22:27 executing program 1: [ 410.684797] audit: type=1400 audit(1574133747.475:251): avc: denied { block_suspend } for pid=14941 comm="syz-executor.2" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:22:27 executing program 3: 03:22:27 executing program 4: 03:22:27 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000001080)=@un=@abs={0x1}, 0x80) bind(r2, &(0x7f00000005c0)=@tipc=@name={0x1e, 0x2, 0x1, {{0x2, 0x3}, 0x2}}, 0x80) write(r1, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000180)=0x7, 0x396) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x2, &(0x7f0000000240)) r4 = dup(r3) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x415}}, 0x1) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x3ffe, 0x4) sendto$inet6(r6, 0x0, 0xffffffffffffffad, 0x0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @rand_addr="ffd6f1b9201348544de96b337da295b8"}, 0x1c) recvmmsg(r6, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f0000000000)) r7 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r7, 0x0, 0xffffffffffffffad, 0x0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @rand_addr="ffd6f1b9201348544de96b337da295b8"}, 0x1c) recvmmsg(r7, &(0x7f0000005c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000, 0x0) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f0000000000)) ioctl$FS_IOC_SETFLAGS(r7, 0x40046602, &(0x7f0000000500)=0xfffffffffffffffe) r8 = inotify_init() lseek(r8, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x16f) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r9, 0xc0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x0, 0x7, 0x4}, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x512}}, 0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x46, &(0x7f0000000140)=0x8, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r10, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) fcntl$dupfd(0xffffffffffffffff, 0x0, r10) r11 = dup2(0xffffffffffffffff, r10) ioctl$TCSETSW(r11, 0x5403, &(0x7f0000000340)={0x3f, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8000, 0xbb4, 0x2}) getsockname(r11, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r12 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) r13 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup2(r14, r13) sendmsg$netlink(r15, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000008c0)=ANY=[@ANYPTR], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="03000000000000000100000014000000", @ANYRES32=r13], 0x14}, 0x0) r16 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r17 = dup2(0xffffffffffffffff, r16) sendmsg$netlink(r17, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000008c0)=ANY=[@ANYPTR], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r16], 0x14}, 0x0) setsockopt$inet_tcp_int(r17, 0x6, 0xa, &(0x7f0000000100)=0xffffffff80000001, 0x0) bind$inet(r12, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(r12, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r12, 0x6, 0x16, &(0x7f0000000000), 0x0) setsockopt$inet_tcp_TCP_REPAIR(r12, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r12, r12) fcntl$setpipe(r12, 0x407, 0x7ff) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x200}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r18 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r18, 0x2007fff) sendfile(r4, r18, 0x0, 0x8000fffffffe) 03:22:27 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:27 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r1, 0x0, 0x0) 03:22:27 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'eql\x00', 0x400}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480), 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) close(r2) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r1) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0xffffff43) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r3, 0xffffffffffffffff, 0x9, 0x1}, 0x10) 03:22:27 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="2e000000260005001900e0713c444d240a000000100003400a0001000300000037153e370900040002000000d1bd", 0x2e}], 0x1}, 0x0) 03:22:27 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="2e000000260005001900e0713c444d240c000000100003400a0001000200000037153e370900040002000000d1bd", 0x2e}], 0x1}, 0x0) 03:22:27 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:27 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r1, 0x0, 0x0) 03:22:27 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="2e000000260005001900e0713c444d240c000000100003400a0001000200000037153e370900040002000003d1bd", 0x2e}], 0x1}, 0x0) 03:22:27 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) 03:22:27 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r1, 0x0, 0x0) 03:22:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@ipv4_newroute={0x24, 0x18, 0xae2070906cdef9f9, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_OIF={0x8, 0x4, r2}]}, 0x24}}, 0x0) 03:22:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000100)="d0", 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xe) fcntl$setstatus(r0, 0x4, 0x80000000002400) 03:22:28 executing program 1: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) unshare(0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000030, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000180)='\\AhHI', 0x2, 0xc8c0, 0x0, 0xfffffffffffffccb) close(r0) 03:22:28 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) mincore(&(0x7f0000008000/0x3000)=nil, 0x3000, &(0x7f0000000180)=""/239) [ 411.910153] net_ratelimit: 14 callbacks suppressed [ 411.910159] protocol 88fb is buggy, dev hsr_slave_0 [ 411.920289] protocol 88fb is buggy, dev hsr_slave_1 03:22:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000380)="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", 0xfffc) 03:22:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x2, r3}) ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, 0x0) [ 412.040968] ptrace attach of "/root/syz-executor.4"[15021] was attempted by "/root/syz-executor.4"[15023] 03:22:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x40830, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@context={'context', 0x3d, 'system_u'}}]}}) 03:22:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffff}) dup3(r4, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) [ 412.181298] SELinux: security_context_str_to_sid(system_u) failed for (dev ramfs, type ramfs) errno=-22 03:22:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) 03:22:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) [ 412.230230] protocol 88fb is buggy, dev hsr_slave_0 [ 412.235687] protocol 88fb is buggy, dev hsr_slave_1 03:22:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140), 0x1325e1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000140)=0xfffffffe, 0x3d5) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x36) fcntl$setstatus(r1, 0x4, 0x42803) [ 412.390151] protocol 88fb is buggy, dev hsr_slave_0 [ 412.395490] protocol 88fb is buggy, dev hsr_slave_1 [ 412.630218] protocol 88fb is buggy, dev hsr_slave_0 [ 412.635399] protocol 88fb is buggy, dev hsr_slave_1 03:22:29 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/enforce\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 03:22:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@cred={{0x1c}}], 0x20}, 0x0) 03:22:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:29 executing program 4: r0 = syz_open_dev$binderN(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 03:22:29 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r2, &(0x7f0000000180)=ANY=[@ANYRES16], 0x2) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36ebe9537217829ae3c72a476a4c0665b17110"}) readv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) dup3(r3, r2, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 03:22:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000c80)=""/226, 0xe2}, {&(0x7f00000001c0)=""/143, 0x8f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000001340)=""/215, 0xd7}, {&(0x7f00000007c0)=""/174, 0xae}, {&(0x7f0000000880)=""/238, 0xee}, {&(0x7f0000000980)=""/226, 0xe2}], 0x4}}], 0x2, 0x20000180, 0x0) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b", 0x44, 0x11, 0x0, 0x0) 03:22:29 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:22:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) [ 412.906880] binder: BINDER_SET_CONTEXT_MGR already set [ 412.916515] binder: 15068:15076 ioctl 40046207 0 returned -16 03:22:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:29 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r3 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 03:22:29 executing program 2: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() gettid() wait4(0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) 03:22:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r1, 0x0, 0x0) [ 413.046920] SELinux: unknown mount option [ 413.082252] SELinux: unknown mount option 03:22:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd00000010000100020c1000418e00000004fcff", 0x58}], 0x1) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd00000010000100020c1000418e00000004fcff", 0x58}], 0x1) 03:22:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r1, 0x0, 0x0) 03:22:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:29 executing program 1: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0xb4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 03:22:29 executing program 2: r0 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x4000000000020009) r2 = socket$inet6(0xa, 0x400000000001, 0x0) eventfd(0x0) close(r2) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) [ 413.228919] audit: type=1804 audit(1574133750.015:252): pid=15120 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/339/bus" dev="sda1" ino=17941 res=1 [ 413.292196] ptrace attach of "/root/syz-executor.1"[15122] was attempted by "/root/syz-executor.1"[15124] [ 413.345926] audit: type=1804 audit(1574133750.135:253): pid=15127 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/339/bus" dev="sda1" ino=17941 res=1 03:22:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 03:22:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r1, 0x0, 0x0) 03:22:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:30 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x6) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/182, 0xb6}], 0x1000000000000113) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$evdev(r1, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0x307) 03:22:30 executing program 1: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x4, 0x0, &(0x7f0000cc3ff0)={0x77359400}, &(0x7f000044b000), 0x0) [ 413.792030] [ 413.794038] ============================= [ 413.798211] WARNING: suspicious RCU usage [ 413.802375] 4.14.154 #0 Not tainted [ 413.806008] ----------------------------- [ 413.810310] include/linux/radix-tree.h:238 suspicious rcu_dereference_check() usage! [ 413.819050] [ 413.819050] other info that might help us debug this: [ 413.819050] [ 413.827213] [ 413.827213] rcu_scheduler_active = 2, debug_locks = 1 [ 413.833899] 2 locks held by syz-executor.4/15140: [ 413.838930] #0: (&sb->s_type->i_mutex_key#12){+.+.}, at: [] shmem_add_seals+0x15e/0x1060 [ 413.848953] #1: (&(&mapping->tree_lock)->rlock){-.-.}, at: [] shmem_add_seals+0x334/0x1060 [ 413.859132] [ 413.859132] stack backtrace: [ 413.863650] CPU: 0 PID: 15140 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 413.870674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.880525] Call Trace: [ 413.883131] dump_stack+0x142/0x197 [ 413.886776] ? vprintk_func+0x65/0x159 [ 413.890689] lockdep_rcu_suspicious+0x153/0x15d [ 413.895381] shmem_add_seals+0x9e0/0x1060 [ 413.899569] ? shmem_put_link+0xe0/0xe0 [ 413.903681] shmem_fcntl+0xf7/0x130 [ 413.907336] do_fcntl+0x190/0xe10 [ 413.910827] ? f_getown+0xb0/0xb0 [ 413.914317] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 413.919265] ? selinux_file_fcntl+0x66/0x110 [ 413.923701] ? security_file_fcntl+0x89/0xb0 [ 413.928152] SyS_fcntl+0xd5/0x110 [ 413.931624] ? do_fcntl+0xe10/0xe10 [ 413.935270] do_syscall_64+0x1e8/0x640 03:22:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) [ 413.939172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.944044] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 413.949254] RIP: 0033:0x45a639 [ 413.952460] RSP: 002b:00007f2c85025c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 413.960189] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 413.967483] RDX: 000000000000000d RSI: 0000000000000409 RDI: 0000000000000007 [ 413.974798] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 413.982091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c850266d4 [ 413.989367] R13: 00000000004c1068 R14: 00000000004d3c60 R15: 00000000ffffffff [ 413.990115] protocol 88fb is buggy, dev hsr_slave_0 [ 414.001778] protocol 88fb is buggy, dev hsr_slave_1 03:22:30 executing program 2: [ 414.022645] audit: type=1804 audit(1574133750.805:254): pid=15127 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/339/bus" dev="sda1" ino=17941 res=1 [ 414.049553] audit: type=1804 audit(1574133750.825:255): pid=15127 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir015242140/syzkaller.MubJI1/339/bus" dev="sda1" ino=17941 res=1 03:22:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 03:22:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:31 executing program 3: 03:22:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:31 executing program 1: 03:22:31 executing program 2: 03:22:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:31 executing program 3: 03:22:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 03:22:31 executing program 3: 03:22:31 executing program 1: 03:22:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:31 executing program 2: 03:22:31 executing program 1: 03:22:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:31 executing program 3: 03:22:31 executing program 1: 03:22:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, 0x0, 0x0) getsockname(r2, 0x0, 0x0) 03:22:31 executing program 2: 03:22:31 executing program 3: 03:22:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 03:22:31 executing program 1: 03:22:31 executing program 2: 03:22:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, 0x0, 0x0) getsockname(r2, 0x0, 0x0) 03:22:31 executing program 3: 03:22:31 executing program 1: 03:22:31 executing program 2: 03:22:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:31 executing program 2: 03:22:31 executing program 3: 03:22:31 executing program 1: 03:22:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, 0x0, 0x0) getsockname(r2, 0x0, 0x0) 03:22:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 03:22:31 executing program 1: 03:22:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:31 executing program 3: 03:22:31 executing program 2: 03:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:32 executing program 2: 03:22:32 executing program 3: 03:22:32 executing program 1: 03:22:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:32 executing program 1: 03:22:32 executing program 2: 03:22:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 03:22:32 executing program 3: 03:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:32 executing program 1: 03:22:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(r2, 0x0, 0x0) 03:22:32 executing program 2: 03:22:32 executing program 3: 03:22:32 executing program 1: 03:22:32 executing program 2: 03:22:32 executing program 1: 03:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(0xffffffffffffffff, 0x0, 0x0) 03:22:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 03:22:32 executing program 3: 03:22:32 executing program 1: 03:22:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(0xffffffffffffffff, 0x0, 0x0) 03:22:32 executing program 2: 03:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:32 executing program 2: 03:22:32 executing program 3: 03:22:32 executing program 2: 03:22:32 executing program 1: 03:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname(0xffffffffffffffff, 0x0, 0x0) 03:22:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 03:22:32 executing program 2: 03:22:32 executing program 1: 03:22:32 executing program 3: 03:22:32 executing program 0: 03:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:32 executing program 1: 03:22:32 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) 03:22:32 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x1e9ac8f6b89d3ba6, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x3d, 0x0, &(0x7f0000000100)=0xffffffc8) 03:22:32 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000100)) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r2, 0x41a}], 0x1, &(0x7f0000000140)={0x0, r3+30000000}, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) arch_prctl$ARCH_GET_FS(0x1003, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x410000, 0x0) ioctl$TIOCGICOUNT(r4, 0x545d, 0x0) 03:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 03:22:32 executing program 1: r0 = socket$inet(0x10, 0x2000000003, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 03:22:33 executing program 2: syz_genetlink_get_family_id$tipc(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) dup(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendto$inet(r0, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) epoll_create1(0x0) close(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) epoll_create1(0x0) epoll_create1(0x0) epoll_create1(0x0) close(0xffffffffffffffff) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) epoll_create1(0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f0000000d00)=ANY=[@ANYRES16, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES32], @ANYRES16], 0xc) setsockopt$sock_int(r0, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 03:22:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 03:22:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:33 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="d3d2b93c3801040408cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYRESHEX, @ANYRESDEC], 0x0, 0x26}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:22:33 executing program 2: pipe(&(0x7f0000000540)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 03:22:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000300)='\x00', 0x1) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r3) 03:22:33 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000000080)={0xffffffffffffeffa}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x25, &(0x7f0000000000)={0x0, 0x0, 0x6ffff}) rt_sigtimedwait(&(0x7f0000000200)={0x7fffffffffffff61}, &(0x7f0000a72ff0), 0x0, 0x8) [ 416.383124] ptrace attach of "/root/syz-executor.1"[15366] was attempted by "/root/syz-executor.1"[15368] 03:22:33 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x0, 0x0, 0x0}) 03:22:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000300)='\x00', 0x1) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r3) 03:22:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000003b80)=""/102400, &(0x7f0000000100)=0x109) 03:22:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) fstat(r3, &(0x7f00000011c0)) 03:22:33 executing program 1: utimes(0x0, &(0x7f0000000080)={{0x0, 0xfffffffffffffe01}}) 03:22:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000300)='\x00', 0x1) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r3) 03:22:33 executing program 1: ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='\xfd\t\xc2\x86\xe3w\xfb\xc7nj\x00', 0x220300, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000540)='./file0\x00', 0x0, 0x30}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r3, &(0x7f0000000980)=[{&(0x7f00000005c0)="e5", 0x1}], 0x1, 0x4081806) sendfile(r1, r3, 0x0, 0x20020102000007) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, 0xffffffffffffffff, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000240)={0x0, 0xfffffffc}) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000140)={0x200000000000006e}, 0x10) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0x0) write(r5, &(0x7f00000001c0), 0xfffffef3) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r5, &(0x7f0000000180)=ANY=[@ANYRES32], 0x4) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(0x0) recvfrom$unix(r2, &(0x7f0000000280)=""/4, 0xfffffffffffffe16, 0x100, &(0x7f0000000100)=@abs, 0x930212) 03:22:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:33 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='\x00\x00t/netstap\x00') ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, [{r4}, {}, {}, {r2}]}) [ 416.989598] audit: type=1400 audit(1574133753.775:256): avc: denied { map } for pid=15396 comm="syz-executor.0" path="/root/syzkaller-testdir747122469/syzkaller.5PEWnU/261/file0/bus" dev="ramfs" ino=55065 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ramfs_t:s0 tclass=file permissive=1 03:22:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PORT_SELF={0x4}]}, 0x2c}}, 0x0) 03:22:33 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0x10, 0x8000000100000003, 0x0) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00.\x00'], 0x1}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 03:22:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) [ 417.134374] net_ratelimit: 14 callbacks suppressed [ 417.134383] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 417.202001] selinux_nlmsg_perm: 2499 callbacks suppressed [ 417.202015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 03:22:34 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) listen(0xffffffffffffffff, 0x4) setuid(0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x80000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) timerfd_gettime(0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000000080)}, 0xfffffffffffffea8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x308, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r6}]]}}}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000023c0)={'sit0\x00', r6}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002580)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'ip6gretap0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000029c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 03:22:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:34 executing program 3: r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10, 0xc1800) dup2(0xffffffffffffffff, r1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) [ 417.250972] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 03:22:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) [ 417.314910] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 [ 417.396397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 03:22:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 417.463789] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 417.516524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 [ 417.541635] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 417.594912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 [ 417.657450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 [ 417.713886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 [ 417.765253] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 [ 417.789311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15420 comm=syz-executor.2 03:22:34 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xfffffe4b}, {0x0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f90bba001b5080da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80bcb860d6a0b61193d4a1cb622431d42fee5e91531bfdfe5cb19ff15d6d891a92ef", 0xa5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1) ptrace$cont(0x18, r0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f", 0x21) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:22:34 executing program 3: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) set_tid_address(0x0) 03:22:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000000), 0x7) fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(0xffffffffffffffff) 03:22:34 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x218}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 03:22:34 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x12b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:22:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000000), 0x7) fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(0xffffffffffffffff) 03:22:34 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='GPL\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300060000000000000009b738000000000000000000002000002097dee40331a90c26696abf3ce4b845b92189fbe26d6ad72883448ec6d96bf45d2b42f3e09ff97ed9ce42b82569946895263daa9982216fdf055fbd54511fa667bd9c8bb76321ab23e0eaf24dcd84229742cc104ab665fd63f9805839f8ebddec1cfab19f6279adc7a9e191a5ba000000"], 0x2b) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 03:22:34 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000800)='./file0\x00', 0xa400295c) r4 = dup2(r3, 0xffffffffffffffff) read(r4, &(0x7f0000000080)=""/113, 0x71) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x72109c5fef5d34d3) chown(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, 0x0) [ 418.079656] ptrace attach of "/root/syz-executor.2"[15476] was attempted by "/root/syz-executor.2"[15478] 03:22:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:34 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)={'system_u:object_r:restorecond_var_run_t:s0', 0x20, 'unconfined'}, 0x4b) 03:22:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000000), 0x7) fcntl$addseals(0xffffffffffffffff, 0x409, 0xd) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(0xffffffffffffffff) 03:22:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@ipv4={[], [], @local}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c00082}) [ 418.132254] ptrace attach of "/root/syz-executor.1"[15483] was attempted by "/root/syz-executor.1"[15487] [ 418.150114] protocol 88fb is buggy, dev hsr_slave_0 [ 418.155287] protocol 88fb is buggy, dev hsr_slave_1 03:22:35 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, 0x0) 03:22:35 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x80) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r2, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff03c}, {0x80000006}]}, 0x10) r4 = accept4(r1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 03:22:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) pipe(&(0x7f00000006c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000040)=@ipx, 0x3f7, &(0x7f0000000440)=[{0x0, 0xffffffffffffff5d}, {0x0}, {0x0}, {0x0, 0xa7}, {&(0x7f0000000400)=""/17, 0x2f2}], 0x5}}], 0x1, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/igmp6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) pipe2(&(0x7f0000000140), 0x0) clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="4022f7dbf2bb01402120148d0f34"], 0xe}}, 0x0) dup(r0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r4}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 03:22:35 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f0000000180)=0x4) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e70e) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) sched_setparam(r5, &(0x7f0000000140)) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x11) fcntl$setstatus(r6, 0x4, 0x6100) set_tid_address(&(0x7f0000000040)) write$FUSE_INIT(r4, &(0x7f0000000180)={0x50, 0xfffffffffffffffe}, 0x50) clone(0x2142001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x11000490) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0x175d9189) socket(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r7 = gettid() r8 = syz_open_procfs(r7, &(0x7f00000001c0)='attr/sockcreate\x00&\xa0\xd1\xf2\x10\xf9\x16E\vv\x0e\x02z\xb6/%\xbdQe(\xe7\xe6\xce\xd0n\x83\x8d\xee\x00\x8cF\xdf\x84|vA\xc8\xe6\r:\\\x1d.\xdb\x1e\x1am\xd4]\b\v0\xd4\f') write$selinux_context(r8, &(0x7f00000000c0)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) accept4$unix(r8, 0x0, &(0x7f0000000000), 0x800) write$smack_current(r8, &(0x7f0000000240)='system_u:object_r:semanage_trans_lock_t:s0\n', 0x2b) r9 = open(&(0x7f0000022ff6)='./control\x00', 0x20000, 0x0) getdents64(r9, &(0x7f0000fc4fbe)=""/80, 0x50) unlinkat(r9, &(0x7f0000000140)='./control\x00', 0x0) 03:22:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000300)='\x00', 0x1) sendfile(0xffffffffffffffff, r3, &(0x7f0000000000), 0x7) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r3) 03:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000300)='\x00', 0x1) sendfile(0xffffffffffffffff, r3, &(0x7f0000000000), 0x7) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r3) 03:22:35 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0x4, 0x0, &(0x7f00000004c0)=[@register_looper], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ppoll(&(0x7f0000000440)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000600)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000001c0)='N'}) [ 418.377756] ptrace attach of "/root/syz-executor.2"[15518] was attempted by "/root/syz-executor.2"[15521] 03:22:35 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000003c0), 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000005c0)) ftruncate(r2, 0x2008002) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) getsockopt$inet6_buf(r6, 0x29, 0x12, 0x0, &(0x7f0000000080)) setsockopt$inet_tcp_int(r6, 0x6, 0x0, 0x0, 0xffffffffffffffc3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.SMACK64IPOUT\x00', &(0x7f0000000140)='GPLvboxnet0wlan0(\x00', 0x12, 0x3) r8 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x10004004) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) write(r4, &(0x7f00000001c0), 0xfffffeda) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioprio_get$pid(0x3, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) ioctl$sock_SIOCOUTQ(r8, 0x5411, 0x0) 03:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000300)='\x00', 0x1) sendfile(0xffffffffffffffff, r3, &(0x7f0000000000), 0x7) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r3) [ 418.470202] protocol 88fb is buggy, dev hsr_slave_0 [ 418.475354] protocol 88fb is buggy, dev hsr_slave_1 03:22:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000300)='\x00', 0x1) sendfile(r2, r3, &(0x7f0000000000), 0x7) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r3) [ 418.630165] protocol 88fb is buggy, dev hsr_slave_0 [ 418.635666] protocol 88fb is buggy, dev hsr_slave_1 03:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 418.701605] IPVS: ftp: loaded support on port[0] = 21 [ 418.870134] protocol 88fb is buggy, dev hsr_slave_0 [ 418.875402] protocol 88fb is buggy, dev hsr_slave_1 03:22:36 executing program 1: openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) sendmmsg(r3, &(0x7f0000003040), 0x4000000000003c4, 0x0) open(0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) dup(r2) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r6, &(0x7f0000000000)=ANY=[], 0x323) creat(&(0x7f0000000380)='./bus\x00', 0x0) getpid() socket(0x10, 0x80002, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f00000014c0)=@proc, 0xc) sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="777720d8eda271af019b56f1e8e002dfeaba101de732ae1afa0546319528a1ed8aa919dbdfc8589ecacbfabe2b3f632e87d3cea6eb57b2670a8d5badb44174429f32fa1e15cd431b6cdd18540bd8a5f3215b31b03d2d26ef3863efd18cc064e2b8f9905130e1162e37735f087a63bb3fff178561a6c836c200f9b78117f53652a6fd6d446ef13f363ec8f35fd2", 0xfffffdeb, 0x81, 0x0, 0xffffffffffffff7f) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:22:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000300)='\x00', 0x1) sendfile(r2, r3, &(0x7f0000000000), 0x7) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r3) [ 419.271442] binder: BINDER_SET_CONTEXT_MGR already set [ 419.278096] binder: 15528:15543 ioctl 40046207 0 returned -16 03:22:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00'], 0x1) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) r5 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) write$binfmt_misc(r5, &(0x7f0000000400)=ANY=[@ANYBLOB="11"], 0x1) ftruncate(r3, 0x2081fc) 03:22:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:36 executing program 0: creat(&(0x7f0000000140)='./bus\x00', 0x12) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/4\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0x2b7}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/4\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, 0x0, 0x4011) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0), 0x4) sendto$inet(r4, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) recvmmsg(r4, &(0x7f0000003a40), 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r5+30000000}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r6 = socket$packet(0x11, 0x40800000000003, 0x300) ppoll(&(0x7f0000000140)=[{r6}], 0x1, 0x0, 0x0, 0x0) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000000000)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r6, &(0x7f00000000c0)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, 0x0, 0x0) sendto$inet6(r6, &(0x7f0000000040)="0104000073d1600000000000fbf55b42b90516db4d916502c555cf09570300a44b29d9fde6ea94211af8e74bab5b98aa9d89060000c846781d1aab3668c64de00004000000711608f2003ee478efddfc86a15aaaf3cd1ad1dfff004000000033e065b42ba58f7599e526b9ac", 0x321, 0x4000000, 0x0, 0x73) r8 = socket$packet(0x11, 0x40800000000003, 0x300) ppoll(&(0x7f0000000140)=[{r8}], 0x1, 0x0, 0x0, 0x0) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000000000)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r8, &(0x7f00000000c0)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000100)=0x162, 0x3e) sendto$inet6(r8, &(0x7f0000000040)="0104000073d1600000000000fbf55b42b90516db4d916502c555cf09570300a44b29d9fde6ea94211af8e74bab5b98aa9d89060000c846781d1aab3668c64de00004000000711608f2003ee478efddfc86a15aaaf3cd1ad1dfff004000000033e065b42ba58f7599e526b9ac", 0x6c, 0x0, 0x0, 0x0) splice(r6, &(0x7f0000000180), r8, &(0x7f00000001c0)=0x60, 0x3ff, 0x1) r10 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r10, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}}], 0xc6, 0x0) 03:22:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000003c0), 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000005c0)) ftruncate(r2, 0x2008002) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(0xffffffffffffffff) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) getsockopt$inet6_buf(r6, 0x29, 0x12, 0x0, &(0x7f0000000080)) setsockopt$inet_tcp_int(r6, 0x6, 0x0, 0x0, 0xffffffffffffffc3) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.SMACK64IPOUT\x00', &(0x7f0000000140)='GPLvboxnet0wlan0(\x00', 0x12, 0x3) r8 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x10004004) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) write(r4, &(0x7f00000001c0), 0xfffffeda) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioprio_get$pid(0x3, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) ioctl$sock_SIOCOUTQ(r8, 0x5411, 0x0) 03:22:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r3, &(0x7f0000000300)='\x00', 0x1) sendfile(r2, r3, &(0x7f0000000000), 0x7) fcntl$addseals(r3, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r3) 03:22:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:36 executing program 3: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x0, &(0x7f0000ff6000/0x3000)=nil) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) 03:22:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r1, &(0x7f0000000300)='\x00', 0x1) sendfile(r0, r1, &(0x7f0000000000), 0x7) fcntl$addseals(r1, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r1) 03:22:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:36 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="40543e75f5bb03000000e075148c0f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) inotify_init1(0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:22:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg$sock(r0, &(0x7f0000000c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@timestamping={{0x14}}], 0x18}}], 0x1, 0x0) 03:22:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000000)=0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r4, 0x0, 0xedc0) 03:22:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 420.007900] ptrace attach of "/root/syz-executor.1"[15633] was attempted by "/root/syz-executor.1"[15634] 03:22:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r1, &(0x7f0000000300)='\x00', 0x1) sendfile(r0, r1, &(0x7f0000000000), 0x7) fcntl$addseals(r1, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r1) [ 420.159213] syz-executor.1 (15641) used greatest stack depth: 24192 bytes left 03:22:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x3e4, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x9f) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:22:37 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000800)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x68, 0x2}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40040}, 0x4000080) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) linkat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0xffffffffffffffff, &(0x7f0000000300)='./bus\x00', 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000940)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000580)) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x24000894) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000c80)={{{@in=@broadcast, @in=@multicast1}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000640)=0xe8) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000003c0)={0x50, 0xfffffffffffffffe, 0x1, {0x7, 0x1f, 0x0, 0x0, 0x1a27, 0x0, 0x8, 0x7}}, 0x50) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) fcntl$getown(0xffffffffffffffff, 0x9) gettid() ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:22:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x203, &(0x7f0000000640)={&(0x7f00000001c0)={0x1c, 0x10, 0x82d, 0x0, 0x0, {0x3}}, 0x1c}}, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000040)={'syz_tun\x00', 0x3}) socket$inet(0x2, 0x1, 0xfe) signalfd4(0xffffffffffffffff, &(0x7f0000000080)={0x400}, 0x8, 0x0) syz_open_procfs(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:22:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r1, &(0x7f0000000300)='\x00', 0x1) sendfile(r0, r1, &(0x7f0000000000), 0x7) fcntl$addseals(r1, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r1) 03:22:37 executing program 2: r0 = gettid() accept(0xffffffffffffffff, &(0x7f0000001380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001400)=0xfffffffffffffe73) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) sched_rr_get_interval(r0, &(0x7f0000001500)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x3, 0x108000001, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff01, 0x9002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x988, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0xff, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20000, 0xffffffffffffffff, 0x9, 0x2, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000271000)={0x8000002, 0x70, 0x49, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa, 0x1000}, 0x0, 0x0, 0x1}, 0x0, 0x3, 0xffffffffffffffff, 0x400) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x7f) fchdir(r1) sched_rr_get_interval(r0, &(0x7f0000000040)) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000017c0)) r3 = memfd_create(&(0x7f00000012c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x2) mkdir(&(0x7f0000001540)='./file0\x00', 0xfffffeffffffffbd) r4 = accept4(0xffffffffffffffff, &(0x7f00000015c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000001640)=0x3c9, 0x800) recvfrom$inet(r4, &(0x7f0000001180)=""/53, 0xffffff57, 0x40011040, &(0x7f0000001300)={0x2, 0x4e62, @remote}, 0xfffffffffffffd93) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x400000, 0x0) socket$inet6(0xa, 0x5, 0x406) connect$packet(r3, &(0x7f0000000100)={0x11, 0x19, 0x0, 0x1, 0x2, 0x6, @broadcast}, 0x14) fcntl$lock(r1, 0x26, &(0x7f0000001580)={0x1, 0x0, 0x300000000, 0x3, r0}) clock_adjtime(0x4, &(0x7f0000001680)={0x8, 0x3f, 0x6, 0x4, 0x1, 0x200000000000001, 0x40400000008, 0xfffffffffffffffe, 0x2, 0x40, 0xfffffffffffffff7, 0x7, 0x5, 0xacb, 0x1, 0x5, 0x1, 0x7, 0xfff, 0x0, 0x101, 0x2, 0xfd6, 0x1f, 0x404, 0x7ff}) capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)={0x0, 0x0, 0x800, 0x0, 0x0, 0x401}) ioctl$RTC_VL_CLR(r4, 0x7014) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getdents64(r5, &(0x7f0000000180)=""/4095, 0x11f8) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/net/pfkey\x00', 0x2000, 0x0) inotify_init1(0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$UI_END_FF_ERASE(r6, 0x400c55cb, &(0x7f0000000080)={0x1, 0x3, 0x10001}) fchmod(r2, 0x800000100000024) ftruncate(r3, 0x401) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) [ 420.716353] nla_parse: 2 callbacks suppressed [ 420.716363] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:22:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 420.755658] audit: type=1400 audit(1574133757.545:257): avc: denied { ioctl } for pid=15659 comm="syz-executor.1" path="socket:[55535]" dev="sockfs" ino=55535 ioctlcmd=0x8935 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:22:37 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') [ 420.848448] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:22:37 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r2, &(0x7f0000000300)='\x00', 0x1) sendfile(r1, r2, &(0x7f0000000000), 0x7) fcntl$addseals(r2, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r2) 03:22:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') getdents(r0, &(0x7f0000000080)=""/47, 0x16ad) 03:22:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x0, 0x0, 0x1}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe81}, 0x48) 03:22:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x24}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) dup3(r4, r3, 0x0) syz_genetlink_get_family_id$ipvs(0x0) 03:22:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46800) listen(0xffffffffffffffff, 0x0) mlock2(&(0x7f0000724000/0x2000)=nil, 0x2000, 0x1) write$FUSE_INIT(r1, &(0x7f0000000000)={0x11c}, 0x10027) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0xffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x102, 0x9032, 0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000100)=""/218, 0xda, 0x0, &(0x7f0000000240)={0xa, 0x4e22, 0x3ff, @empty, 0x1200}, 0xffffffffffffff06) socket$nl_xfrm(0x10, 0x3, 0x6) 03:22:38 executing program 3: unshare(0x26000200) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') setns(r3, 0x0) 03:22:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @initdev, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000180)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 03:22:38 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r2, &(0x7f0000000300)='\x00', 0x1) sendfile(r1, r2, &(0x7f0000000000), 0x7) fcntl$addseals(r2, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r2) 03:22:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x20003ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_selinux(r0, &(0x7f0000000380)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:var_spool_t:s0:\x00\x009\xd5\x87\xdb\' \x11\xb2p\x8a_\xcc\xc3\x86N\x18e\xa3\x13K$1\x97\f?\xba9\xc8\x05\xad\x1c\xf3J\\\'\xfc\xf6\x0f\x1a', 0x4a, 0x0) 03:22:38 executing program 3: socket$inet6(0x10, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x11) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = syz_open_procfs(0x0, &(0x7f00000010c0)='net/tcp6\x00') read$FUSE(r2, &(0x7f0000000000), 0x1170) write$FUSE_NOTIFY_POLL(r2, 0x0, 0x15) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)=0x8) fchdir(0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000003c0)={0x0, 0x2, 0xfffffffffffffffb, 0x6}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000100)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') dup3(0xffffffffffffffff, r4, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00\x00\x00v\x98\x91bS\xb3\x81\x99\x00', 0xb00}) ioctl$TUNSETLINK(r5, 0x400454cd, 0x30a) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) ioctl$FS_IOC_GETFLAGS(r8, 0x80086601, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r8, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000001480)={{{@in=@empty, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000fc0)=0x91) openat$cgroup_ro(r8, &(0x7f0000001000)='pids.events\x00', 0x275a, 0x0) ptrace(0x10, r3) wait4(r3, 0x0, 0x2, 0x0) 03:22:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0xff}, 0x0, @in6}}, 0xe8) sendmmsg(r0, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 421.698473] SELinux: Context system_u:object_r:var_spool_t:s0: is not valid (left unmapped). 03:22:38 executing program 2: getrandom(&(0x7f0000000040)=""/15, 0xf, 0x3) 03:22:38 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r2, &(0x7f0000000300)='\x00', 0x1) sendfile(r1, r2, &(0x7f0000000000), 0x7) fcntl$addseals(r2, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r2) [ 421.746973] audit: type=1400 audit(1574133758.535:258): avc: denied { relabelto } for pid=15729 comm="syz-executor.2" name="UDP-Lite" dev="sockfs" ino=55621 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=rawip_socket permissive=1 03:22:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 03:22:38 executing program 1: openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x1ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() syz_open_procfs(r2, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) write(r3, &(0x7f0000000140)="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"/297, 0x3accf8d5) ptrace(0x4206, r2) tkill(r2, 0x800000009) 03:22:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x1f}, 0x45c) open(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) dup3(r1, r2, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) 03:22:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:38 executing program 2: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="02071604020000000e0101000001002025f10f022f5c6b796fdec5eba45d92d5f0b248000b17a103004a076462284d8bf691568bc7fd070165bd1bd624f7030000000060cddccd3758426c871390b0a68fbd3dfc6679b089f6d4abe572ce762d3c9eaf4ded5fef07d8ad4946cf00"/125], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba71996d8ee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084adbe40039649673b73383b717e127c6a36da871a86cc8c8dda850000000002000100000000000000060080ffffff05000500000000000a000000de7af7bd3e10c05ce0099eb0f8374525b1f361d6c7358f00002000fe04654184a88aa49a679449f6d3385443608204fd2f0a8e7f36b51b8c111a11526cc92a34da97348aa1e55e86429a374167641de7060933bfc02befaf8fd06658ea9c382b5cacba6d7e1a8c9e627a6c5d885d96d8c456caa29fa7592f4872f237d960f9bd3e93872452834345b9138bd1e1ce35e8634023f06a625c651fa3c9e7840cd45f500b8d475d9e1f4a44f035848a8345330609d7a6b882b9abcb07e08dc4c81289a3e6dc9c6274769e51f79512b3628b00f3f903f5ce0dd00192aa31aef1a418d93d47123fae14a368b81069de22c692d1aaad9e46f06dd074665fe032dad38def1bc9f01b656fe7a4feceea9216fd5808f4a6ba1f46acb154d50bab14a60bec1d9d578c8ee1d1dc6f10bdf1a0dd31015a814f8a39d8a90aef37"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4000, 0x0, @rand_addr="4ae5b260659db3413e7535a265185a40", 0x3}, 0x1c) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x4e24, 0xfffffffc, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000740)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x35, r1}) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x10000, @mcast2, 0xffff}, 0x1c) r3 = accept4$inet6(r2, 0x0, &(0x7f0000000000), 0x80000) ftruncate(r3, 0x9) [ 421.988589] ptrace attach of "/root/syz-executor.3"[15756] was attempted by "/root/syz-executor.3"[15759] 03:22:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x3) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x16) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) r1 = syz_open_pts(r0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x20) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 03:22:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) [ 422.075078] input: syz1 as /devices/virtual/input/input24 03:22:38 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000000)={0x3, 0x0, 0x0, 0xfdfdffff}) 03:22:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) 03:22:39 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x44, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000000058000000000000001800000000000000", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYBLOB="852a627300633bf6c8b9de6cb10000000000000000000000852a7470000000000000000000000000000000000000000000000000000000000000000000000000852a6273"], @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000180000000000000040"]], 0x0, 0x0, 0x0}) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 03:22:39 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000180)=[@register_looper], 0x1, 0x0, &(0x7f0000000140)="f4"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 03:22:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x2) [ 422.307599] input: syz1 as /devices/virtual/input/input25 [ 422.310162] net_ratelimit: 8 callbacks suppressed [ 422.310169] protocol 88fb is buggy, dev hsr_slave_0 [ 422.318135] protocol 88fb is buggy, dev hsr_slave_1 03:22:39 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000007100)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000002c0)="0017fdeb685dee7bea4941b50c605a772af84c0538300133daa6684a5bd030cea791503e3fffa1927f004c70673295736ba4115faad6a3ca545daa7bc882f011ceddd5a8e2654a5af1d0902ae31f5b504c5a4662649d8b45140d9b7f556d0ed3", 0x60}, {&(0x7f0000000340)="ccc064d454bf8d14fbd303e83e7848cff718", 0x12}, {&(0x7f00000004c0)="0539b5003fb76cea7cac97c3b6f1d768a48ef9aaab8369919d3eda033eddcfe3e6839accea2f4c67997c58f04b66d61edba1ada5486844035170af2d4e0baff93ddc9394682a92c7ed441d149a10b5b92af22ed7234cbfad470058fba5f15b413be6d39dc6d4cbfa0879d3e3c0566f98d8a2e8ec203d7796ebed9742c5ee06b8a6c80f8d8c78641b99a6df62ee28c4e4a9d334f7c7c4e508d752cc0329163ce30db12de085f2e072dbfe287da56c814faba5ff80f944f42fbe980b5cb5f3bd", 0xbf}], 0x3}}, {{0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000b00)="910b2945cc78686ecf55aaced5eb172d9dbb9f56d0c7df06497cc674", 0x1c}, {&(0x7f0000000e40)="be74d9ffd4c3ed2a218dc5e8de1a250288d5d033f344f1f2ca8836a7a59e63c11d1e115a6afdffc8d099440e2d2764bfe70229a0ebb365f68b6eb819b3373486", 0x40}], 0x2}}], 0x2, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8020003) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x1c3, 0x4000002, 0x0, 0x199) 03:22:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x101080, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) pipe(0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) getpid() fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000400)=""/220) write(0xffffffffffffffff, &(0x7f00000001c0)="45f6e9b8001157ae8d37002d39", 0xd) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r6 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r6, 0x280080) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 03:22:39 executing program 0: socket(0x0, 0x2, 0xfa) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000b28000)=0x6) gettid() socketpair$unix(0x1, 0x1, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x12) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) poll(0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt(0xffffffffffffffff, 0x7, 0x20, 0x0, &(0x7f00000003c0)) ioctl(0xffffffffffffffff, 0x8ebd6, &(0x7f0000000380)='\x00\x00') ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCCBRK(r1, 0x5428) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x107fffffff) socketpair(0x5, 0x800, 0x2, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) pipe(&(0x7f00000004c0)) io_setup(0x8000009, &(0x7f0000000180)) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0xff) r4 = creat(&(0x7f0000000700)='./bus\x00', 0xc6) write$cgroup_type(r4, &(0x7f0000000340)='threaded\x00', 0xffffffc5) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) 03:22:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 03:22:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x7}, 0x8) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 03:22:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(0x0, 0x2) 03:22:39 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socket$key(0xf, 0x3, 0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/mcfilter\x00') ioctl$RTC_WIE_OFF(r0, 0x7010) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/41, 0x29}], 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x32}, 0x2, @in=@dev, 0x0, 0x3, 0x0, 0x5}}, 0xe8) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 03:22:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0xb) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') sendfile(r4, r5, 0x0, 0x80000001) [ 422.605403] ptrace attach of "/root/syz-executor.3"[15851] was attempted by "/root/syz-executor.3"[15853] [ 422.630136] protocol 88fb is buggy, dev hsr_slave_0 [ 422.635690] protocol 88fb is buggy, dev hsr_slave_1 03:22:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(0x0, 0x2) 03:22:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) [ 422.740403] selinux_nlmsg_perm: 5 callbacks suppressed [ 422.740418] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=15864 comm=syz-executor.2 03:22:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) io_setup(0x6, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="7f"], 0x1) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffc, 0x0, 0x0, 0x0}, 0xffffff83) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 03:22:39 executing program 0: socket$inet(0x2, 0x4000020000000001, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000200)) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000040)=@ipx, 0xfffffec9, &(0x7f0000000440)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000400)=""/28, 0x1c}], 0xffffeb4}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/igmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socket$inet(0x2, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket(0x20000000000000a, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="40349bbb0140212014520f34"], 0xc}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r2, 0x40) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r3}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 422.790145] protocol 88fb is buggy, dev hsr_slave_0 [ 422.795408] protocol 88fb is buggy, dev hsr_slave_1 03:22:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(0x0, 0x2) 03:22:39 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="24000000030307031dfffd946ff20c0020200a0009000300021d8568021baba20400ff7e", 0x24}], 0x14}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) 03:22:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, 0x0, 0x0) personality(0x400000a) timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) clone(0x8300a100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d97927940000fffffff820004000000000ed0869c9f9dc0100df77c4"], 0x30) mlockall(0x0) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) [ 422.882562] ptrace attach of "/root/syz-executor.0"[15881] was attempted by "/root/syz-executor.0"[15882] 03:22:39 executing program 3: read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000480)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2b) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x0, 0x0, 0x0, 0x7}, 0x20) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'sit0\x00'}) bind$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x4, 0x0, 0x1, 0x6, 0x6, @dev={[], 0x27}}, 0x14) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 03:22:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r2, &(0x7f0000000300)='\x00', 0x1) sendfile(r1, r2, &(0x7f0000000000), 0x7) fcntl$addseals(r2, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r2) [ 422.943954] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 422.954670] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 422.968171] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 422.977522] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:22:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 423.030147] protocol 88fb is buggy, dev hsr_slave_0 [ 423.035417] protocol 88fb is buggy, dev hsr_slave_1 [ 423.075103] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 423.088175] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 423.432487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=15914 comm=syz-executor.2 03:22:40 executing program 3: pipe(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() creat(0x0, 0x0) pipe(&(0x7f00000000c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000788ffc), 0xfdf6) connect$inet(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x60000000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) poll(&(0x7f0000000000)=[{}, {}, {r1}], 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) socket$inet6(0xa, 0x0, 0x0) 03:22:40 executing program 0: r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10, 0xc1800) dup2(0xffffffffffffffff, r1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00\xebf\xba\n\xa1\xb6\x1d\x17\x8c\fP6\b\x8bS\x93\xbf\x15\x06\xa5\xe9Ef\xe0\x86\xbc\xf2\x82\x8e4\x91\xd9D\xc1\x8ed\xa4k\xf7\xc9\xaa\xd8#m\x05\xebY=X\xee!nV') clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5", @ANYRESOCT, @ANYRESOCT, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8d", @ANYRESDEC], 0x0, 0xba}, 0x20) tkill(r2, 0x39) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) mlockall(0x0) 03:22:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 03:22:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r2, &(0x7f0000000300)='\x00', 0x1) sendfile(r1, r2, &(0x7f0000000000), 0x7)