r7, 0x4040534e, &(0x7f0000000180)={0x1a0, @tick, 0x3a, {0x1, 0x2}, 0x5, 0x2, 0xa0}) 14:06:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) [ 614.231782][T30944] FAT-fs (loop2): bogus number of reserved sectors [ 614.253696][T30944] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:48 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) 14:06:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) [ 614.453218][ T34] audit: type=1800 audit(1604239608.910:215): pid=30923 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15778 res=0 errno=0 14:06:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00<\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 614.501227][T30955] FAT-fs (loop2): bogus number of reserved sectors [ 614.507878][T30955] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:49 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) [ 614.660370][T30966] FAT-fs (loop2): bogus number of reserved sectors [ 614.675190][T30966] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:49 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400", 0xc}], 0x0, &(0x7f00000009c0)=ANY=[]) [ 614.910933][T30973] FAT-fs (loop2): bogus number of reserved sectors [ 614.918617][T30973] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:49 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) 14:06:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2b8300, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x2a) 14:06:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = syz_open_dev$hiddev(&(0x7f0000000000)='/dev/usb/hiddev#\x00', 0xfffffffffffffffe, 0x101000) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x3f, 0x20, 0x7, 0x2, 0xd96c222b6a9ca096, 0x6, 0x40, 0xca, 0x40, 0x3, 0x295, 0x6, 0x38, 0x1, 0x2, 0x101}, [{0x6, 0x2, 0x4, 0x6, 0xbf9, 0x5, 0x9, 0x40}], "ae83ee498e6b17346c74a6286214d8af833cffd219ca6af679ad20172d908eb2b1f0b0bbc3c641ad4abb0a97b4c3882756b739688fa80a0d9b2d62071ec2d35d342ed8186db9422fe17156aabd834c1f9aec00b23cac9e4394ad1d66d687f2e5e57ba91d77056026cd5ab3698e33778b5287e52426775a85b0c5e0afeea9", [[], [], [], [], [], [], [], []]}, 0x8f6) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 615.095067][T30983] FAT-fs (loop2): invalid media value (0x00) [ 615.124140][T30983] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:49 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) 14:06:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7ff}, 0x8) 14:06:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00=\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 615.362295][T30993] FAT-fs (loop2): invalid media value (0x00) [ 615.368351][ T34] audit: type=1800 audit(1604239609.820:216): pid=30971 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16181 res=0 errno=0 [ 615.398082][T30993] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:49 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240", 0x12}], 0x0, &(0x7f00000009c0)=ANY=[]) [ 615.544435][T31003] FAT-fs (loop2): invalid media value (0x00) [ 615.560611][T31003] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:50 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1010c1, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x404000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000040)={0x9, 0x4, [0x1]}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:06:50 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) [ 615.740216][T31014] FAT-fs (loop2): invalid media value (0x00) [ 615.766449][T31014] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:50 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) 14:06:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x100, 0x8, 0x7f, 0x4, 0x10000, 0xb3}) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 615.923908][T31020] FAT-fs (loop2): invalid media value (0x00) [ 615.950267][T31020] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x80) accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x800) 14:06:50 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004", 0x15}], 0x0, &(0x7f00000009c0)=ANY=[]) 14:06:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002340)=[{{&(0x7f0000000080)=@nfc_llcp, 0x80, &(0x7f0000001580)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/170, 0xaa}, {&(0x7f0000001200)=""/183, 0xb7}, {&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/250, 0xfa}, {&(0x7f0000001440)=""/94, 0x5e}, {&(0x7f00000014c0)=""/22, 0x16}, {&(0x7f0000001500)=""/109, 0x6d}], 0x8, &(0x7f0000001600)=""/183, 0xb7}, 0x8}, {{&(0x7f00000016c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001740)=""/159, 0x9f}, {&(0x7f0000001800)=""/196, 0xc4}, {&(0x7f0000001900)=""/253, 0xfd}, {&(0x7f0000001a00)=""/198, 0xc6}, {&(0x7f0000001b00)=""/28, 0x1c}, {&(0x7f0000001b40)=""/111, 0x6f}], 0x6, &(0x7f0000001c40)=""/205, 0xcd}, 0x2}, {{&(0x7f0000001d40)=@tipc=@name, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001dc0)=""/152, 0x98}, {&(0x7f0000001e80)=""/64, 0x40}, {&(0x7f0000001ec0)=""/37, 0x25}], 0x3, &(0x7f0000001f40)=""/99, 0x63}, 0x809}, {{&(0x7f0000001fc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002040)=""/38, 0x26}, {&(0x7f0000002080)=""/146, 0x92}, {&(0x7f0000002140)=""/140, 0x8c}, {&(0x7f0000002200)=""/95, 0x5f}], 0x4, &(0x7f00000022c0)=""/71, 0x47}, 0x3}], 0x4, 0x2000, &(0x7f0000002440)={0x77359400}) sendmsg$NL80211_CMD_GET_KEY(r2, &(0x7f0000002540)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002500)={&(0x7f00000024c0)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008844) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 14:06:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) [ 616.159219][ T34] audit: type=1800 audit(1604239610.620:217): pid=31010 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16211 res=0 errno=0 14:06:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00>\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 616.201078][T31034] FAT-fs (loop2): invalid media value (0x00) [ 616.225247][T31034] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:50 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) [ 616.374088][T31046] FAT-fs (loop2): bogus number of FAT sectors [ 616.386296][T31046] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:50 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) [ 616.516951][T31054] FAT-fs (loop2): bogus number of FAT sectors [ 616.533695][T31054] FAT-fs (loop2): Can't find a valid FAT filesystem 14:06:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={0x0, 0x8003}, 0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) sendmsg$sock(r2, &(0x7f0000000600)={&(0x7f0000000240)=@llc={0x1a, 0xf, 0x1, 0x8, 0x4, 0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000006c0)="6658845616df464de0d7826e81acaf2fad06c66a5b3c6f17b9fde90767d2a340bd22d3a7de60813de82eee4f4475ee21624647ae6d51354e549e07f41da0da03c14e44e7f7996e4a8d50c78a33087d90817f500f1f68118a0ac51869ba888c44afed019bbc24c8d72df25f9d19d3f43e6a8ff757ba6f2faec52d6cb0d62d11021ad9da22507c85c3ff9c5b99a340982beecbfecc0daae3b6aa6a02bbfe260646952ad21b8ec597efbb74a70d51524a136199895ebeb4fbcfa0f4bbf9ad2901bea29fc4dd8f044276ea9bcdd15bdbc31a4eb37bc85b797608da5b763847a2026e7b181cbe5c5cf5274c15b0ce", 0xec}, {&(0x7f00000003c0)="1287a9ae015d68180346c2949d0c6640b9d596de34fa615bddb735d7ec499c3bea54e20530b5ea6a87bee44d0aa4162d55281e758289c4b33e8ba07c9bedd9fe8e068d98e92f322424d66fa2f5df4d663d3f939d00c4017943bc85355cf96444fd2979a2123a8fb221ff793f8278a85744a8834ea378e0e2f8", 0x79}, {&(0x7f0000000440)}, {&(0x7f0000000480)="764813f17c9704c4eea015be03f2198546f4db04b14cf8e4acd4ce8bf1483bbe23549d82234f8c4abd5a044eb93266b30d46257dbf228659409c1edab2e602c6fb3e3f384c605b5872819147f1825b1c2c5d582be67064b7c78e46525d324bcf9903984bca54a84eac6ce82e4af20c03f578f0789d148fafb9162b74e5a09186b9cc8d6b287df7e8b84499dbb294434c6e3b173d1a8aedb0a1362cbade0792b0147cd40b9a94934df8f0151e951c70861af23bc168f5226c4a9cb4ff01c427", 0xbf}], 0x4, &(0x7f0000000580)=[@timestamping={{0x14, 0x1, 0x25, 0xc084}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x1ff}}], 0x48}, 0x40890) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0x1) ioctl$vim2m_VIDIOC_STREAMOFF(r3, 0x40045612, &(0x7f0000000180)=0x5) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000000)=""/54) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r4, &(0x7f0000000000)='0', 0x1) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @loopback}, &(0x7f0000000200)=0xc) r5 = getpid() syz_open_procfs(r5, &(0x7f0000000080)='net/psched\x00') capget(&(0x7f0000000080)={0x19980330, r5}, &(0x7f0000000140)={0x8ca9, 0x100, 0xe6, 0x8, 0x2, 0x1ff}) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x20000002, @empty, 0x20}, 0x1c) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000680)={0x9f0000, 0xad4b, 0x100, 0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x980900, 0x6b93, [], @p_u8=&(0x7f0000000440)}}) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:06:51 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}], 0x0, &(0x7f00000009c0)=ANY=[]) [ 616.697873][T31059] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) [ 616.749850][T31061] FAT-fs (loop2): bogus number of FAT sectors [ 616.765231][T31061] FAT-fs (loop2): Can't find a valid FAT filesystem [ 616.814972][ T34] audit: type=1800 audit(1604239611.270:218): pid=31051 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16132 res=0 errno=0 14:06:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000000)) 14:06:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00?\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:06:51 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) 14:06:51 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) 14:06:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, 0x0, 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x402000, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="380000006c000100000000000000000000020000", @ANYRES32, @ANYBLOB="000000000000000018003480140035"], 0x38}}, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r4, 0xc0045002, &(0x7f0000000000)) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r4, 0x8008f511, &(0x7f00000001c0)) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_deladdr={0x30, 0x15, 0x100, 0x70bd27, 0x25dfdbfb, {0x2, 0x80, 0x4, 0xff}, [@IFA_LOCAL={0xfeac, 0x2, @local}, @IFA_BROADCAST={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x37}}, @IFA_FLAGS={0x8, 0x8, 0x482}]}, 0x30}, 0x1, 0x0, 0x0, 0x24004001}, 0x40080) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x40000, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback, 0xfffffffa}, 0x1c) 14:06:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, 0x0, 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:51 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, 0x0) 14:06:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, 0x0, 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x0, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:51 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) 14:06:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00@\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 617.570815][ T34] audit: type=1800 audit(1604239612.030:219): pid=31100 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15768 res=0 errno=0 14:06:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x0, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:52 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 14:06:52 executing program 2: 14:06:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x0, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:52 executing program 2: 14:06:52 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x3b, 0x8}, {0xfff}]}) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$bt_cmtp(0x1f, 0x3, 0x5) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000000)) 14:06:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:52 executing program 2: 14:06:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) dup3(r3, r2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x28, r6, 0x1, 0x70bd2b, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x3a}]}, 0x28}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[], 0x38}}, 0x20000800) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="380000006c00010000000000000000000002000067702883e427101be41098fe83f492944c1fc43933d2e79501f2887dd594d3146c715ca4018620bc30c20794395b21b87789acd1807dae51beba0f06b96f593f45a515d67599c823c2efd594918be7c2fd34cacd85b15a7c26566d9602b2a26da865c7dd5bf4507ea2122809192d86df967d074b65e7ee6146243e6abb69f4382c585ba7395299380b93c3dcfc574952970518ac8ee26d346fee556ba498952ca2d312c545fbb42b8afb94d5831d51d95daf9e529a37fbd4f1598a582c0feb198009035b4abac5b8164e4b47f1c7d03dad606f76825642b8cf41c53b9ff36542f2e97d86498d92c1bf034d171b790f1a27045044a2d4922cbf4c5775540abb45876203dba5b67408767912604e0af5423c3aaa0047d7d76014cc9b9f55c37027b3eb6c950468a3703509b5b5fa295f32237a812985720c5023581f06d4858e026c6cc606d9728b1200"/359, @ANYRES64=r3, @ANYRESOCT=r4], 0x38}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002dbd7000fddbdf2513000000400001801400020076657468305f746f5f627269646765000800030000000000080003000100000008000100849709201f2df2ff8b6843b546c372c211da6cf4aa06cd633289140e99b32f060eba0bf83f08e9fe13223f9eef44d50b4ba4", @ANYRES32=r1, @ANYBLOB="08040100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x54}, 0x1, 0x0, 0x0, 0x4000c04}, 0x24000880) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x40}}, 0x1c) 14:06:52 executing program 2: [ 618.291937][T31133] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 14:06:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000004c0)={&(0x7f00000001c0)={0x2ec, r1, 0x100, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_REKEY_DATA={0x68, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="a10635037f690c86cce9103f1de2e702"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="ebfd8679d0eed02a294f64830a8f2edb"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "af783595860fec11"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="ce4ea906bd935e6b6418bfd2d0b881b89380a3ebfc95a9e65b03c58ab904205f"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "4ddcb003f4362cea"}]}, @NL80211_ATTR_REKEY_DATA={0x7c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "4e67d02e1a564960"}, @NL80211_REKEY_DATA_AKM={0x8}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x50}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xcc}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xf}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="a650aee7398f1542026174e7395e1752"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "ee3bfd3694deaf65"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="b72cc10d90b8024b825a7ed0880308607dfdc20d3d5f77d08b51b79a1b3b8727"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1}]}, @NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="2101dd2c722b5e62136a838c8fcf455b"}]}, @NL80211_ATTR_REKEY_DATA={0x50, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="5b7409d013a6a06cee57e2fe462e21404019dc2b457ae342"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xba}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="9f92dffde3a9bb9464fd77ce0f09d4ad"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="ffc27b997260a561044233c4f7ddf7db"}]}, @NL80211_ATTR_REKEY_DATA={0xb4, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x1}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0c448aafb20ec5a73bac790dcf85d32d"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="0dd0a7d19fe820800d13d74ade65470a"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="00df9ffacf8057f4ec68ab82455fe570"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="1d39e2034f4f910155bb02d92779a2fb"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="445a6d08494f2cce8a69fdfc5517c8b3a3363e87c3d524c1518d3a71988dae8d"}, @NL80211_REKEY_DATA_AKM={0x8}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "f6951a79a7059e3f"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="56f1ddc8ea5eaf71e0a480d77ea4ec77"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "7511bffb22e4a998"}]}, @NL80211_ATTR_REKEY_DATA={0x98, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x5}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "556f089f65c9ccba"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="d65603f08df8e7bd224d0292a5c3c2c4"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="a59afcedf13095f56092235f450a80c5"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "12021d0e1d72de67"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "d0206dc63bd7e2cf"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="d71c13ced42b42f80e5c31bf9bb5ce3cd1c705b8aede33912e3ad07bb060b52f"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xc822}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="382b80ad306bd13863315adf069bede8"}]}, @NL80211_ATTR_REKEY_DATA={0x40, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "04511d7817d91827"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x4000}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xc2f}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="6caa0076edb0baf405d4c166cbf2be2c"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "78c8bf69fecdd004"}]}]}, 0x2ec}, 0x1, 0x0, 0x0, 0x801}, 0x8000) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5, 0x24}}}}, [@NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x48080}, 0x800) 14:06:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00A\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:06:52 executing program 2: [ 618.433262][ T34] audit: type=1800 audit(1604239612.890:220): pid=31139 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16354 res=0 errno=0 14:06:53 executing program 2: 14:06:53 executing program 2: 14:06:53 executing program 2: 14:06:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$SIOCX25SSUBSCRIP(r1, 0x89e1, &(0x7f0000000140)={'ip6tnl0\x00', 0x1, 0x7}) 14:06:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x260) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="2000000052000102"], 0x20}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) keyctl$update(0x2, 0x0, &(0x7f0000000040)="cf30a19b0ea445c192df3162f2a3d67d5fa4bd130734c292f4f992dfbc30ca4f7f0734fc5ed2266ae54d29839806517323e36e77b3aa868fc5affe96467060e9cb0eccdafa1d3913f2f2d157b3bd952a2c160df8cea6ad8a8b1124fceee0e30690141498e7d510750a13a4aee5b4a495471e33cf2782eba3403031eb9493bf82645febee0979591e3122b9760a0ea7be69e231e30ee0a8c7ca9ac335ae", 0x9d) sendto$inet6(r4, &(0x7f0000000000)="584896004ef7f9ffbef2ce0200000015e383134c7bb38c4729f2bbae1f06c96deddf2a25bebbce", 0x27, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r5, &(0x7f0000000000)='0', 0x1) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x140c, 0x200, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_CQN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x5}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff6000/0x8000)=nil, 0x8000, 0x2000002, 0x8010, r5, 0x0) 14:06:53 executing program 2: 14:06:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}, 0x8001}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:06:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:53 executing program 2: [ 619.192885][ T34] audit: type=1800 audit(1604239613.650:221): pid=31149 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:06:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00B\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:06:53 executing program 2: 14:06:53 executing program 2: 14:06:53 executing program 2: 14:06:53 executing program 2: 14:06:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080)={0x6, 0x3ff, 0x9, 0x0, 0x200}, 0x14) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={r1, 0x4d, "6fd701809a144bf8fdfbf54ea34bedf96fcd0490ce48bad3b520ed79982da00c51fa8dc0a18b86882634e1a64f43a5aa87dc7cb1dad44515a8f8386042c9af1b1e8db6d89fae144ebe281bfffe"}, &(0x7f0000000200)=0x55) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000040)) 14:06:54 executing program 2: [ 619.990952][ T34] audit: type=1800 audit(1604239614.450:222): pid=31180 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15762 res=0 errno=0 14:06:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0xfffffffd, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:06:54 executing program 2: 14:06:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$BLKRRPART(r1, 0x125f, 0x0) connect$phonet_pipe(r1, &(0x7f0000000000)={0x23, 0xff, 0x20, 0x9}, 0x10) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000140)=0x3, &(0x7f0000000180)=0x4) getsockopt$netlink(r1, 0x10e, 0x8, &(0x7f0000000080)=""/22, &(0x7f00000000c0)=0x16) 14:06:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00C\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:06:54 executing program 2: 14:06:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000000)={0xa, 0x80000000, {0x57, 0x0, 0x3, {0x9, 0x34e}, {0x80, 0x56e}, @cond=[{0x0, 0x7, 0x4, 0x200, 0x26, 0xa}, {0x401, 0x2, 0x40, 0x1f, 0x40, 0x800}]}, {0x53, 0x5, 0x7f, {0xfb3, 0x7}, {0x9, 0x4}, @ramp={0x9, 0x7f, {0x8001, 0x3f, 0x8, 0x81}}}}) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x6) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$HIDIOCGDEVINFO(r2, 0x801c4803, &(0x7f0000000140)=""/4096) 14:06:54 executing program 2: 14:06:54 executing program 2: 14:06:54 executing program 2: 14:06:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) sendto$inet6(r2, &(0x7f0000847fff)='\x00', 0x52, 0x5, &(0x7f000005ffe4)={0xa, 0x4e36, 0x0, @private2={0xfc, 0x2, [], 0x1}}, 0x1c) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xb, 0x1010, r1, 0x97c9d000) 14:06:55 executing program 2: [ 620.909553][ T34] audit: type=1800 audit(1604239615.370:223): pid=31213 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16259 res=0 errno=0 14:06:55 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x5, &(0x7f0000000340)=[{&(0x7f0000000080)="f2f0276ae1c82bab95341e9e71b029523a4901fd631e732ab6bdc02ec4e8821b43a2cf50e2b29f203d48ad0ebc7fc2da2967320c120053b147246566767821ac2b1f9688f76f1b5af871fc30a66ce54eb0e02613c69a5bd951baa1be4493207f8e9709ad876c9b", 0x67, 0x3}, {&(0x7f0000000140)="99f333a1faae7f6d1df50e91e2ded3590625878d35d80c5aaaf19ac015599863d69e1b9eddd565e1f2fccd07b52b81d2e646d1f131c622763d88176a4d2a20cd5adb243d714488a9daa6610a36abdd38f7e01d7b204e0960feeb75705572eb0ef4ac41ad754e8e84e5400cdb0c9cbd7186c9309e2e819daf16", 0x79, 0x57}, {&(0x7f00000001c0)="7b64d59f1ba9dd596b3e658db0c206f12df3c1e503f555f7540fa032a981d8b0bfea935bc510da95b48531c5e1aaa4f19b2e8c416a5ecfd5f0e6f9bc6f5cb881c62fde21c04487c916f408eee574a29e78b5987db4fa63461b2581e33889", 0x5e, 0x7fff}, {&(0x7f0000000240)="9c258db3566176f828f59429c723755dff3aaa7efafbf70ec5c034e5283e98149cf8a80eb30aa028eef95f38cfdbb582d355324d6f99e0d45551b0ce4274616da6f379b108743a9eed789b8fda446abe1a1bbee4dadc1bc1d91b0a28733c95d7db55dc47256d39b5e5e13d4dc08bf5d07e9f063b4155eab0fd4163510b309c3c406d6cbe8106c905db84cab25b8debc610ec3be891512f9ab976cb910ac18fcaeaa62a09260a8d9869b25429592f7226087eae848468f894d5d2", 0xba, 0x9}, {&(0x7f0000000300)="a2dc3b22f525240cbf01c3cc7fe84997c8918e57de91014e24c97d13a87a46384658d5ba2616643ca228207de53794b6", 0x30, 0xd1}], 0x40, &(0x7f00000003c0)={[{@partition={'partition', 0x3d, 0x1000}}, {@dmode={'dmode', 0x3d, 0x8}}], [{@obj_user={'obj_user', 0x3d, '&'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@pcr={'pcr', 0x3d, 0x34}}, {@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}]}) fsetxattr$security_ima(r1, &(0x7f0000000480)='security.ima\x00', &(0x7f00000004c0)=@v2={0x0, 0x1, 0x3, 0x3, 0xbb, "8cff75e838c6b290bb6617f0aa58745a894ece9eae5674a0430fd4bc7d296dfd9b4f7025b7afe0d8bcea796b59109f072de986dcebcc2da9ebdf0f82e50f9b5b0f388b763c5e66da8dd60083c557e4dd67207961a0183d7fe79418a167696338766caba891b380ff17e154f45429f36469bda62498b1030a188812b55961bc60d9b250f21dd223c510f7a1f74f2630e9d166ba354f515164295573d42d4cc8655a32ec524a1ac3bf735b3345d958268f75e0a078c73c27c391fff4"}, 0xc4, 0x3) 14:06:55 executing program 2: 14:06:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000000140)=[{0x0, 0x1, {0x2, 0xff, 0x3}, {0x2}, 0xfe, 0x1}, {0x0, 0x1, {0x2, 0x1}, {0x3, 0x1, 0x3}}, {0x0, 0x0, {0x1, 0x0, 0x1}, {0x1, 0xf0}, 0x0, 0x2}, {0x2, 0x1, {0x78b37ce5a9667a39, 0xff, 0x2}, {0x1, 0x3a9205fefc4a98ac, 0x3}, 0x2, 0x1}, {0x3, 0x1, {0x0, 0xf0, 0x2}, {0x0, 0x110, 0x2}, 0xfe, 0x1}, {0x1, 0x0, {0x2, 0xf0, 0x1}, {0x2, 0xff, 0x2}, 0x2, 0x2}, {0x0, 0x3, {0x2, 0xff, 0x2}, {0x0, 0xff}, 0x0, 0xfd}, {0x3, 0x3, {0x0, 0xff, 0x4}, {0x2, 0x0, 0x3}, 0x2, 0x2}, {0x1, 0x3, {0x0, 0xff, 0x3}, {0x0, 0xf0}, 0xfd, 0x56c018f0b07e3b23}], 0x120) 14:06:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(0xffffffffffffffff, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00D\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:06:55 executing program 2: 14:06:55 executing program 2: 14:06:55 executing program 2: 14:06:55 executing program 2: 14:06:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r2, 0xc0045002, &(0x7f0000000000)) fstat(r2, &(0x7f0000000080)) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$HIDIOCGRAWINFO(r1, 0x80084803, &(0x7f0000000000)=""/84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:06:55 executing program 2: 14:06:56 executing program 2: [ 621.811745][ T34] audit: type=1800 audit(1604239616.270:224): pid=31244 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16381 res=0 errno=0 14:06:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000000)={0x3}) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:06:56 executing program 2: 14:06:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(0xffffffffffffffff, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair(0x27, 0x4, 0x8001, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23, 0x6, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffe}, 0x1c) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000080)={@broadcast, @dev}, &(0x7f00000000c0)=0x8) 14:06:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00E\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:06:56 executing program 2: 14:06:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:06:56 executing program 2: 14:06:56 executing program 2: 14:06:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000000)={0x7, @capture={0x1000, 0x1, {0x7, 0x1}, 0x9, 0xffffff26}}) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:06:56 executing program 2: 14:06:56 executing program 2: 14:06:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0xff, @remote, 0x2}}, 0xffffff80, 0x7ff, 0x10001, 0x328b61a5, 0x40a40000}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYBLOB="b0000000c7f62648beabc782b07c40125cf27eef6fb160e85ab9b0c0d4008150b28b399183cbdfbc093be582fb990253fd7c438425119176d31ccd4958db6dbd9c1ac263a9494bfbf4e423a7d488b88e4ef7af4c6d5d1b15a2fe4d6f5f067d63607955ef35c556306d90dc3c187515915b667f7b631fd0fd7e5d0caa8da919863c6ce3e6bff82734cad1f7ae4dcb0fae79b842a193a01f5e3af4986c85a7f1a38870bce1efadd5b2ac5f425cf1d7f0be645ae79d"], &(0x7f0000000200)=0xb8) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x1000, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:06:57 executing program 2: 14:06:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x8, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x4004000) 14:06:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(0xffffffffffffffff, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) [ 622.839416][ T34] audit: type=1800 audit(1604239617.300:225): pid=31277 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:06:57 executing program 2: 14:06:57 executing program 2: setfsgid(0xee01) syz_init_net_socket$rose(0xb, 0x5, 0x0) 14:06:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)='\x00'/10, 0xa, 0x4, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback, 0xfffffffc}, 0x1c) 14:06:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00F\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:06:57 executing program 2: 14:06:57 executing program 2: 14:06:57 executing program 2: 14:06:58 executing program 2: 14:06:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:06:58 executing program 2: 14:06:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty, 0x7}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x80, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x44}}, 0x1c) ioctl$DRM_IOCTL_AUTH_MAGIC(0xffffffffffffffff, 0x40046411, &(0x7f0000000000)) 14:06:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x2b, 0x4, 0x0, {0x5, 0x4, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:06:58 executing program 2: 14:06:58 executing program 2: 14:06:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00G\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:06:58 executing program 2: [ 624.162623][ T34] audit: type=1800 audit(1604239618.620:226): pid=31313 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16381 res=0 errno=0 14:06:58 executing program 2: 14:06:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0x6a, 0x7, &(0x7f0000000600)=[{&(0x7f0000000140)="ae5bbf9b548c2fdd278eec4013f7d9ad1d5a30196d73eca1f88add4d7a57e57845b036bd8df545aea4a75ae8a66c6021997002b3d6c230c4e7dd753e24aa47e53ddc0ac73cc773fefb5bfdf0b29dd1f04dc8c45b9ddaa32fd443c8736b3dbeeaf62c0539bd9e8baa7e6bcc61b5071677be49119cb2ab18b2527c3b55926913cb634decbb9ff83cc3d90954b702666552061b305679b9561ca154a40efab4d7f14ac5adacda1afdcd", 0xa8, 0x6}, {&(0x7f0000000800)="a7e214d65377dd911b872e1b405d8abf3faef01240918333752f4302865c3d92c37d4a2b089f1af24e7a6352ac19600b8cf20000000005015797bcaf490f06e0badb1246d622c8bdc2c4cabc2e6e53b9b1cf95b2ef966d86c965f48da7c6725ceb0b25b59dfcff1e1ada0054c5704ea60962d45e0af40fb37c7b852525609b96d59a6f7963ff4447dc8f463b7d22d541816d42da012954ff91492634f4b447abc489919de783f6eee35016395efb437e4067c27e789b1ceb23de784554606a1c87b08afc00351e55f55617b1ed5f5480c33e635e2374b57b56b4d4e7c5517af3de408f229081bee7f8690cf2e3be10d8eeae637a10b92a598455134e025d985c109f8e0a352222a4226182b1962365ca877b75e6872359ff58efc0c0714388dfdfb02ac2791a4906f7198c4a571030b31a9ffc32f23819543e1da66b684d12916350882ed29919f43f5bfbc9da8b42d1177901f2fb99f3d40c1ce632ee14a5ba48b63fa7aa518de71780831a19be6876082095484b6500", 0x177, 0xfa4e}, {&(0x7f0000000700)="1dd27e7a9114c16dd27b8fee8e0b6c77fef200fbd1e3765b77cca66d928771c83a3728ee7db68d839239886e767729598acb822b3e44056dcefafb5fafb47ad422411a2ac0c0a17238a78e238fe3d31a4ecc75f4964e222c84be8d19f490005da64209c7351d143d24eea43bb67fcdd4f4abe801d84ed7ea13f976a170c6a61b721784be587b687cc2fa28a56a801c55627c94c2a4597d24c2014ce24431ded1c8a2e540a524c18882236b0b432b9b0a965429589d6ee94b1bd0eadb15d5cfa8dc0b7c0cd421d838e6dedb", 0xcb, 0x7f}, {&(0x7f0000000300)="c3e23efff68c29b140959ee3242435b028fb548985c6ebf924964b0f8fdaa6e9d27fea30c9027555b583dcb9d7137407ac2158e107baab0b5a5097e66d2d64b4b6e0bbc3f19d7f0c6de1ca90cb3960ebc1c1d3ac0a9ea94b82987cab19df5bab5ad1e23d12291d321e8bafe9ba517075dc344f703d79d6f38f771699944335afb978d4960141b82d1ea97cfde56d767775e8f24d379fa81e2216a553780c3909c4", 0xa1}, {&(0x7f00000003c0)="c177fa01f8d16e8feaf78b8e8aa7cda312", 0x11}, {&(0x7f0000000400)="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", 0xff, 0x6}, {&(0x7f0000000980)="5ca28ad73162e5c35e0ce9c27a27c494dc7f286d9aafdfea07abcf5721dd7ca4de353df1b8af98bfdd59a99b6942457161f3104133c99c066a32cd0fe3426482c066ec803c5a55dce9d6208efc7bd791f0bbd209fb436d21068b6a3b73651279a49614e0b27a270762ca9bb2105a256875dd439b440158d5857d17b8c1736e86f34f62a853de7c2f80b2363b8240770ea03ab274a210d09ed461c0f4bf391c4badd2245fcd8173ecbe24fb36df6e1e90411ccce06751a0c2f7d71fe0091167c184de6fb79d8d80d594ceb0d80c08278e6808f50e6900000000b2d97982e893ade6bb898264c99414825811adfbaad597e345d3415bc5e7abdc84629599a74f46eea6a71c3efb992db5c6cdf63399b6b4b80e4b769db30ee5f34525e00800000000000000e72dbada638ef22f7fb18155d251d156591ec4522a371bd6253b", 0x13e, 0x3}], 0x40000, &(0x7f00000006c0)={[], [{@dont_measure='dont_measure'}, {@dont_appraise='dont_appraise'}]}) dup3(r1, r0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:06:58 executing program 2: 14:06:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:06:59 executing program 2: 14:06:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:06:59 executing program 2: 14:06:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f00000002c0)=0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa050}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd7000fbdbdf25010000000500130009000000050022000100000008000b0003000000060002000000000005002200000000006d2ce76570392600c89028e35f72aa1115984c5f8edbb64de1cbba4f1ceb9124d82ea7f1039e6515d25fddcc020b69139973aaa0756b464d53c67c8a987025dc946ae46446340c471568e18457183b04d0b0bb8a3f6afc836700000000008000"/160], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000140)={0x1, 0x1, @raw_data=[0x8001, 0x9, 0xff, 0x4657, 0x20000000, 0x0, 0x1f, 0x2, 0x0, 0x7, 0xffffffff, 0xd9706af, 0x36, 0x1, 0x1f, 0x1]}) 14:06:59 executing program 2: 14:06:59 executing program 2: 14:06:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00H\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:06:59 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x6}]}, 0x28}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x6}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r2, 0x509, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x63}, @val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x22135aea, 0x13}}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4004}, 0xc000) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r9, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r9, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x80000001, 0x20}, 0xc) 14:06:59 executing program 2: [ 625.121566][ T34] audit: type=1800 audit(1604239619.580:227): pid=31349 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:06:59 executing program 2: 14:06:59 executing program 2: 14:07:00 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000080)='/dev/video#\x00', 0x2b, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x1, @pix_mp={0x0, 0x0, 0x34324142}}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000040)=0x0, &(0x7f00000001c0)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYBLOB="d4000000", @ANYRES16=0x0, @ANYBLOB="200027bd7000fddbdf25040000002000018014000200626f6e645f736c6176655f30000000000800030003000000280001801400020076657468315f746f5f68737200000000080003000100000008000100", @ANYRES32=r3, @ANYBLOB="2800018008000100", @ANYRES32=0x0, @ANYBLOB="08000300020000001400810000007468315f6d6163767461635c0da28d8d03a2140002006261746164765f736c6176655f300000080003000500000008000100", @ANYRES32=0x0, @ANYBLOB="67656e65766531000000ced14c02fcb008c03ee4cbb04ceb75000000000000140002007600000000"], 0xd4}, 0x1, 0x0, 0x0, 0x94}, 0x40001) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$nl_sock_diag(0x10, 0x3, 0x4) 14:07:00 executing program 2: 14:07:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) 14:07:00 executing program 2: 14:07:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) set_mempolicy(0x40000000004003, &(0x7f00000000c0)=0x8, 0xc2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x100201, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x2a}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e24, 0x0, @private0, 0x6f}, 0x1c) 14:07:00 executing program 2: 14:07:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00I\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:00 executing program 2: [ 625.992274][ T34] audit: type=1800 audit(1604239620.450:228): pid=31385 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16383 res=0 errno=0 14:07:00 executing program 2: 14:07:00 executing program 2: 14:07:00 executing program 2: 14:07:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @private=0xa010100}, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:01 executing program 2: 14:07:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) [ 626.597352][ T34] audit: type=1800 audit(1604239621.050:229): pid=31426 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15769 res=0 errno=0 14:07:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00J\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:01 executing program 2: 14:07:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @private0}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:01 executing program 2: 14:07:01 executing program 2: 14:07:01 executing program 2: 14:07:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0xd4, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:01 executing program 2: 14:07:01 executing program 2: [ 627.428873][ T34] audit: type=1800 audit(1604239621.880:230): pid=31447 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16213 res=0 errno=0 14:07:01 executing program 0: r0 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x1000, 0x0, 0x6}, 0x18) ioctl$VT_DISALLOCATE(r0, 0x5608) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:01 executing program 2: 14:07:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) io_setup(0xc, &(0x7f0000000000)=0x0) io_getevents(r1, 0x0, 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f00000000c0)={0x77359400}) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00K\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:02 executing program 2: 14:07:02 executing program 2: 14:07:02 executing program 2: 14:07:02 executing program 2: socket(0xa, 0x3, 0x7) 14:07:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) 14:07:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x3, 0x7, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFACCT_QUOTA={0xc}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x8000}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x78c2}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2bd15d08}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x1}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x48000}, 0x88d4) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @local, 0x5}, 0x1c) [ 628.030709][T31487] sctp: [Deprecated]: syz-executor.2 (pid 31487) Use of struct sctp_assoc_value in delayed_ack socket option. [ 628.030709][T31487] Use struct sctp_sack_info instead 14:07:02 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000180)='connect aa:aa:aa:aa:aa:10 1', 0x9) [ 628.399302][ T34] audit: type=1800 audit(1604239622.860:231): pid=31477 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16365 res=0 errno=0 14:07:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:02 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000), 0x4) 14:07:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24, 0x400000, @private2={0xfc, 0x2, [], 0x1}, 0x10001}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_mptcp(0xa, 0x1, 0x106) 14:07:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00L\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:03 executing program 2: 14:07:03 executing program 5: modify_ldt$read(0x0, &(0x7f0000000000)=""/210, 0xd2) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:03 executing program 2: 14:07:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001cc0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 14:07:03 executing program 2: select(0x40, &(0x7f0000000000)={0x5}, 0x0, 0x0, 0x0) 14:07:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) geteuid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:03 executing program 2: r0 = add_key$keyring(&(0x7f0000000e40)='keyring\x00', &(0x7f0000000e80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0x0) 14:07:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000000)) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:03 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0x1) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x4, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 629.379518][ T34] audit: type=1800 audit(1604239623.840:232): pid=31518 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16370 res=0 errno=0 14:07:03 executing program 2: r0 = add_key$keyring(&(0x7f0000000e40)='keyring\x00', &(0x7f0000000e80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0x0) 14:07:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, 0x0) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00M\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000100)={{}, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 'syz1\x00', 0x0}) 14:07:04 executing program 2: syz_mount_image$gfs2meta(&(0x7f0000000580)='gfs2meta\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000a80), 0x2385000, &(0x7f0000000b40)) 14:07:04 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind$pptp(r0, 0x0, 0x0) 14:07:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000190000042bbd7000ff450000000000000002fe0e000000000800076bfd0000010800100089010000"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x8004) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @local}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000140)=0x20c000, 0x4) 14:07:04 executing program 2: r0 = socket(0x1e, 0x1, 0x0) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) 14:07:04 executing program 2: r0 = socket(0x1e, 0x1, 0x0) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) 14:07:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x1ff, 0x8, 0x401, 0x2, 0x3d, 0x101, 0x3ff}, 0x20) [ 630.213308][ T34] audit: type=1800 audit(1604239624.670:233): pid=31555 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:07:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={r2}, 0x8) 14:07:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00N\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001700)={0x24, 0x2a, 0x1, 0x0, 0x0, "", [@typed={0x4}, @nested={0xd, 0x0, 0x0, 0x1, [@generic="5182ac72bba3858f13"]}]}, 0x24}], 0x1}, 0x0) 14:07:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x40, @ipv4={[], [], @local}, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000000)={0x3, 0xb38, 0x1}) 14:07:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, 0x0) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:04 executing program 2: syz_mount_image$v7(&(0x7f0000000000)='v7\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffb, 0x4, &(0x7f0000000480)=[{&(0x7f0000000080)="657b57b4adeead6695fda5266255ae65e4c4ef794a7fa6e2a5f8e417f0e9feeeb6206d5f251e51da6382057734a79d9c694991372918570d145a5a57d5f721538a729c262ca9c390fa654f83453b166e6b6d2b559bc71da44e7cef6f05e51001275935743159eb1b40fee8645a47e9bf0fcee1f4199d4c2a32c873020870d391b650bfb4b954929e1804dec830079ba0abfbbb06a3f90c0d01540e5d1b6f4568be5ba9cd2511d4ee6a", 0xa9, 0x100000000}, {&(0x7f0000000140)="63b2cca3e5896e5b7544055b5ecbf62ea7bce357d21e4a253e77c0a9b7e01ab3ff81b0a9f799915b2ec199a3c65e5aa383125422d760318404d2873f1a283f7e9959cef34fea33d4b1ab5261c4391362051a09498a0920f53a81b98d5c64cf1441a824cb3eb965f6ac4718b54953d0d364022b49551736d8c3d91188d6ae4c424eb5567a44512e7b7c526142862bbee1e9ba91d92469", 0x96}, {&(0x7f0000000300), 0x0, 0x6}, {0x0}], 0x0, &(0x7f0000000540)={[{'({$'}, {'#'}, {'*'}, {'.'}, {'%'}, {}, {}, {'/&R}'}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}]}) geteuid() syz_mount_image$hfsplus(&(0x7f0000000580)='hfsplus\x00', &(0x7f00000005c0)='./file0\x00', 0x8c35, 0x0, &(0x7f0000000640), 0x42000, &(0x7f0000000680)={[{@uid={'uid'}}, {@nls={'nls', 0x3d, 'cp936'}}, {@gid={'gid'}}], [{@euid_gt={'euid>', 0xee01}}, {@euid_lt={'euid<'}}, {@appraise='appraise'}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) syz_mount_image$squashfs(&(0x7f0000000780)='squashfs\x00', &(0x7f00000007c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000d40)={[{'.'}, {'{,:$-'}, {'appraise'}], [{@appraise_type='appraise_type=imasig'}]}) accept(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001540)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x4000042) prctl$PR_SET_THP_DISABLE(0x29, 0x0) [ 630.581229][T31598] VFS: could not find a valid V7 on loop2. [ 630.734287][T31598] VFS: could not find a valid V7 on loop2. 14:07:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 14:07:05 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000580)='hfsplus\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x0, &(0x7f0000000680)={[{@nls={'nls', 0x3d, 'cp936'}}]}) [ 631.028184][T31615] hfsplus: unable to find HFS+ superblock 14:07:05 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000100)={0x4, 0x8, [0x0, 0x0]}) 14:07:05 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 14:07:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00O\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 631.189853][ T34] audit: type=1800 audit(1604239625.650:234): pid=31600 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16369 res=0 errno=0 14:07:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, 0x0) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:05 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)="186c8dc1efccc1c1b4ec2eabb6afa543ef", 0x11, 0x10, &(0x7f0000000080)={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xe}, 0x8}, 0x1c) 14:07:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback, 0x1ff}, 0x1c) 14:07:05 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, 0x0, 0x0) 14:07:05 executing program 2: r0 = socket(0x29, 0x2, 0x0) getsockname$netlink(r0, 0x0, 0x0) 14:07:06 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) accept4$unix(r0, 0x0, 0x0, 0x80800) socket$l2tp6(0xa, 0x2, 0x73) 14:07:06 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x2482) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x7ff}, {}, {}, @result}], 0x1c) 14:07:06 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x2482) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x7ff}, {}, {}, @result}], 0x1c) 14:07:06 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hwrng\x00', 0x40, 0x0) 14:07:06 executing program 2: syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x80080) 14:07:06 executing program 2: modify_ldt$write(0x1, &(0x7f0000000200)={0x200}, 0x10) [ 632.038433][ T34] audit: type=1800 audit(1604239626.490:235): pid=31641 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16381 res=0 errno=0 14:07:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00P\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "c5aaa60ede51624e", "864c5763936863e98331468f4821e710", "f1f78926", "f80a846da4091b9b"}, 0x28) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:06 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) sendmsg$alg(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) 14:07:06 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_INITSTATE(r0, 0x113, 0x4, 0x0, 0x0) 14:07:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @dev}}}, @ip_tos_u8={{0x11}}], 0x38}}], 0x1, 0x0) 14:07:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @dev}}}, @ip_tos_u8={{0x11}}], 0x38}}], 0x1, 0x0) 14:07:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000017500), &(0x7f0000017540)=0x20) 14:07:07 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001440), 0x5a, 0x0, 0x0) 14:07:07 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000000c0), 0x4) 14:07:07 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000580)='hfsplus\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x42000, &(0x7f0000000680)) [ 632.969865][ T34] audit: type=1800 audit(1604239627.430:236): pid=31675 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16372 res=0 errno=0 14:07:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00Q\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000013c0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 14:07:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:07 executing program 2: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080)="ee12", 0x2, 0xfffffffffffffffc) 14:07:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001380)={0x6c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x8e}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x60}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x9}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x69c4}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3ff}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x200048c0}, 0x20008801) syz_emit_ethernet(0x1226, &(0x7f0000000140)={@broadcast, @dev={[], 0x29}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "4095ce", 0x11f0, 0x89, 0x0, @mcast1, @local, {[@srh={0x73, 0xa, 0x4, 0x5, 0x6, 0x70, 0x4c72, [@private2={0xfc, 0x2, [], 0x1}, @private0={0xfc, 0x0, [], 0x1}, @mcast2, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}, @fragment={0x33, 0x0, 0x3, 0x0, 0x0, 0x8, 0x64}, @dstopts={0xc, 0x7, [], [@jumbo={0xc2, 0x4, 0x401}, @enc_lim={0x4, 0x1, 0x4}, @jumbo={0xc2, 0x4, 0x9}, @calipso={0x7, 0x28, {0x1, 0x8, 0x81, 0x4, [0x40, 0x8, 0x200, 0x9]}}]}, @dstopts={0x0, 0x216, [], [@calipso={0x7, 0x28, {0x2, 0x8, 0x3, 0x101, [0x10001, 0x400, 0x10000, 0xcbd4]}}, @generic={0xcd, 0x1000, "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"}, @jumbo={0xc2, 0x4, 0x2d7bb7e7}, @calipso={0x7, 0x18, {0x1, 0x4, 0x1, 0x8, [0xe02e, 0x3]}}, @enc_lim={0x4, 0x1, 0x6}, @ra={0x5, 0x2, 0xfffe}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x10000}, @calipso={0x7, 0x50, {0x3, 0x12, 0x8, 0x9, [0x92, 0x86, 0xffff, 0xfffffffffffffffa, 0x9, 0x1000, 0xfffffffffffffff7, 0x9, 0xfffffffffffffffc]}}]}, @fragment={0x1d, 0x0, 0x0, 0x1, 0x0, 0x18, 0x64}, @fragment={0x3c, 0x0, 0x80, 0x1, 0x0, 0x1f, 0x68}, @fragment={0x3c, 0x0, 0x5, 0x1, 0x0, 0x1, 0x68}, @hopopts={0x32, 0x5, [], [@hao={0xc9, 0x10, @private2}, @calipso={0x7, 0x18, {0x3, 0x4, 0x81, 0x8, [0x3, 0x9fd3]}}]}], "db15c9a57d38a19242b727f54dc4ac1619f496b122d185349c9a1a81bb309168ad099f5764b0c99e6705e0e86471ac4eec090c78ca73de6e"}}}}}, &(0x7f0000000040)={0x0, 0x2, [0x1f3, 0x50f, 0xebc, 0xfa2]}) ioctl$USBDEVFS_CLAIMINTERFACE(0xffffffffffffffff, 0x8004550f, &(0x7f0000000000)=0x2) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:07 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) 14:07:07 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) 14:07:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) readv(r0, 0x0, 0x0) 14:07:08 executing program 2: r0 = socket(0x2, 0x2, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xffe1, &(0x7f0000000fc0)={0x0}}, 0x0) 14:07:08 executing program 2: r0 = socket(0x2, 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x4881) 14:07:08 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x280, 0x0) 14:07:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00R\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 633.902514][ T34] audit: type=1800 audit(1604239628.360:237): pid=31715 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16375 res=0 errno=0 14:07:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:08 executing program 2: syz_open_dev$media(0xfffffffffffffffe, 0x0, 0x0) 14:07:08 executing program 2: r0 = fanotify_init(0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 14:07:08 executing program 2: select(0x40, &(0x7f0000000000)={0x5}, &(0x7f0000000040)={0x7}, 0x0, &(0x7f00000000c0)={0x77359400}) 14:07:08 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7, 0x428400) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000100)={0xa, 0xfffa, 0xfffffffc, @private2={0xfc, 0x2, [], 0x1}, 0x7ffd}, 0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) sendmsg$IPSET_CMD_PROTOCOL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, 0x1, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x4010010}, 0x18804) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="18000000", @ANYRES16=r2, @ANYBLOB="094a29bd7000fedbdf250100000006000b000b000000"], 0x1c}}, 0x40) sendmsg$NLBL_MGMT_C_PROTOCOLS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="24004fb4220b3848727ac0e65978951f1ac8eaa1d2bce2352d3031ba216494259077d858dda9f1a2fc66a08d0d98ea81e58d7633ca437f9f79df9b0cfca08584e037ae11e7f119ec43b498434e35fb911d9f46efbc8d8b747d8662601d5ff98b2080523e4d209394cbbf56cb6462e463495e917b28359c44d17d3ec9d5bebb10bfab561a86086bcd0cdff5ba5b7bee93ae4671b03384f16edb98bb8fd0164aec14441e0bc578025ef0704a0c8d74c6ff543dec467beb58775750ce124899b2e03ae293de5d0f4ca15b947381965565150e14b0d63c32407c6e4940807c0000e95f44cbcc0000e690479c6d8bff12990e14dff4dff6e4", @ANYRES16=r2, @ANYBLOB="04002cbd7000ffdbdf250700000006000b002100000006000b002a000000"], 0x24}, 0x1, 0x0, 0x0, 0x20040041}, 0x8880) sendto$inet6(r0, &(0x7f0000847fff)='E', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r3, 0xc0045002, &(0x7f0000000000)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000680)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x40, r5, 0xc694d42685586125, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_VERSION={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private}, @GTPA_TID={0xc}, @GTPA_LINK={0x8}]}, 0x40}}, 0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f00000018c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001880)={&(0x7f0000001840)={0x34, r5, 0x300, 0x70bd2b, 0x7f, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_VERSION={0x8}, @GTPA_FLOW={0x6, 0x6, 0x1}, @GTPA_O_TEI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008090}, 0x40000) preadv(r3, &(0x7f00000017c0)=[{&(0x7f0000000480)=""/135, 0x87}, {&(0x7f0000000540)=""/225, 0xe1}, {&(0x7f0000000640)=""/167, 0xa7}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000140)=""/11, 0xb}, {&(0x7f0000001700)=""/178, 0xb2}, {&(0x7f0000000200)=""/33, 0x21}], 0x7, 0xadcb, 0x1) 14:07:08 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 14:07:08 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00'}) 14:07:09 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, 0x0, &(0x7f00000000c0)) 14:07:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e1f, 0x1, @empty, 0x4d61e004}, 0x1c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x8, 0x80}) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 14:07:09 executing program 2: msgget(0x0, 0x712) socket(0x15, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0xde5f], 0x1, 0x0, 0x0, 0xffffffffffffffff}) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x114, 0x12, 0x400, 0x70bd25, 0x25dfdbff, {0x23, 0x80, 0xdd, 0x38, {0x4e23, 0x4e22, [0x5, 0x0, 0x2, 0xed], [0xbe, 0x4, 0x3, 0x1], 0x0, [0x101, 0x4e34]}, 0x0, 0x3}, [@INET_DIAG_REQ_BYTECODE={0x54, 0x1, "97a9cb5af21b9053c2ea5f21eb1724febe0519b6e346a6fdec30cb1de5024249c725a1ea7b5ecf64bb0b6e6572e1e3525dabe40ac1421639144b528451924b4afe8885e1b929bfcc4d48a1865e527654"}, @INET_DIAG_REQ_BYTECODE={0x72, 0x1, "574aae324f9fa97ca3895aa214fa8cfea378c959cb6bba41ecdb6cf2be7f4b374fe4df5006042b4c678ad69cef8802b8d612905a6f513971eb9c452f815ea80972893cd8810128f132516a3a6c0b4874a9565dcb8c7e9f6eff9f3873fd4cd16ed9c1427fe351350bd2f79cc523fe"}]}, 0x114}, 0x1, 0x0, 0x0, 0x8000}, 0x840) [ 634.949744][ T34] audit: type=1800 audit(1604239629.410:238): pid=31752 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16375 res=0 errno=0 14:07:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) getsockopt$llc_int(r1, 0x10c, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x40200, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x2c0c1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000040)={0x80000ea6, 0x8, 0x1e, &(0x7f0000000000)="431ea2f9a53986c4eb797cdc004ea1ddbd350361eb9826914a0e34831c0d"}) 14:07:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00S\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:09 executing program 2: r0 = socket(0x2, 0x2, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 14:07:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xfffffffffffffdc4, 0x40000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback, 0x3}, 0x1c) 14:07:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x17e) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000040)) socket$bt_hidp(0x1f, 0x3, 0x6) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:09 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000280)={{0x3}}) 14:07:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000004240)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000003740)=0x9c) 14:07:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)={0x14, 0x7, 0x5, 0x301}, 0x14}}, 0x0) 14:07:10 executing program 2: syz_mount_image$affs(&(0x7f0000000040)='affs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}]}) 14:07:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x3f, 0x4, 0x0, 0x28, @loopback, @empty, 0x8, 0x40, 0x5, 0x101}}) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x1a) [ 635.706380][T31816] affs: Unrecognized mount option "fscontext=system_u" or missing value [ 635.715079][T31816] affs: Error parsing options [ 635.782292][T31816] affs: Unrecognized mount option "fscontext=system_u" or missing value [ 635.818184][T31816] affs: Error parsing options 14:07:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_MGMT(r1, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000e40)={0x1c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 635.963550][ T34] audit: type=1800 audit(1604239630.420:239): pid=31825 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15784 res=0 errno=0 14:07:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00T\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00'}) 14:07:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r1, 0xc0045002, &(0x7f0000000000)) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYBLOB="000004806d6178"]) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000200)) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:10 executing program 2: socketpair(0x1d, 0x0, 0xd5, 0x0) 14:07:10 executing program 0: r0 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x80800) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000180)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r3, 0xc0045002, &(0x7f0000000000)) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000007b00)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r5 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000007b40)='/dev/vim2m\x00', 0x2, 0x0) r6 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r6, 0xc0045002, &(0x7f0000000000)) r7 = openat$cgroup(r2, &(0x7f0000007b80)='syz0\x00', 0x200002, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r8, 0xc0045002, &(0x7f0000000000)) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000007bc0)='/dev/sequencer\x00', 0x400080, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000007c40)={0x0, 0x0}, &(0x7f0000007c80)=0xc) sendmmsg$unix(r2, &(0x7f0000007dc0)=[{&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000240)="6b4b3bff6e5c25f83fd170bba75b710629ec34442672e2416dd4e08e3c36a8c8706ab91981655b72fa80fc851840bff54a026caee17777d9952b4e2b7388e5ddd0833b232f54e02fe0a580cc953e78f3463630d656079ac9ee677691e9f8b07951c30a8aad50d50618f175f38aa3e24f118c6732b5adfee7b608e4fd75e87b5bb36cf59307d33cd0fadd95fc7d4c6db0807bb148", 0x94}, {&(0x7f0000000300)="c10929c0b1e0cc0787f4ba0252d079f4c0f2429e9c89a73290c1c1911120b8f78280905af7e0be9a573094b6dfef92", 0x2f}, {&(0x7f0000000340)="5e5162ef8f3bdb4d9eb1ffcf3207e1042bf64d95c4a1a46b69d96405f1f284b089e540204b7d41efe05bf02a3fe955d5387b568fe660388b69c39020d504d55254f89978016ac35e7eadf7079a0827da2c17e557d18ba691e78c0e2cb8932777f50278a46056c63278c4b79954a5556cf5fed22fbf6bd045ffc19ab76176c313e4738b680dd282c6075896a93b12b370135b1695f594c617849d652939de033cb6fb964f18a0df6c96bd58d11f3d838635a025375573dcf1ef66c8588ae6d97f301c84e82f96215915fc815285e81c638fbb176337a1a792a082510f5dd43eedd42b631c6a1129cc1f62941a7c7bf5ec736bf0169b9d656c", 0xf8}, {&(0x7f0000000440)="d3e2d2c7022a007629ccd55905130d326ec98fb9721ccae42027c4f2724f61075da5730c555236b70e9b1a3ded2c6754290df671fabd6ca26e836d1fb6fc1a674c1fda703aaaeee6f60b478d2b6fa570ce8cdf07e6f8a1ce01c2d27bd08d93bffcd5916ba7ecdb3182caed73cf027e87413d6b96b65ae8386ccbd148815fbaa8a4a935062e92771ceea1a44703aa89b0d5f69728220a7e3c01d3a23ecd0207c6f3cf335285e1cf037207fcbdb34bc9c3d80c7b4cd71d4438cdf8e1114925af3ebe2d91380382bab965f64bbede5d9e4740d0647b04ce5c8f0dcd0d67a595392bd532b5c8c1e35b", 0xe7}], 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="000100"/16, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00'], 0x78, 0x80}, {&(0x7f0000000680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000700)="620281b71574df2f6fa72919f7c41ed90c320f9c748cb0bcf48a70e2813e4393b845b036349b53086c80ef743011a577aa587798baa2bb457648ad6638a9ca4aed72d66388453266bc008cd58b49d27422bf8c7ac26fe13b00a9b79eb34a594136226b82abfe8fb4815933c74d778c4a5236635cf3db07", 0x77}], 0x1, &(0x7f0000000c80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x18, 0x1, 0x1, [r0, 0xffffffffffffffff]}}], 0x88, 0xc000}, {&(0x7f0000000d40)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000e80)=[{&(0x7f0000000dc0)="69916cc1adc2dfcf3cba17ce31e8fdc663cfe41c956e82ffe11e93fbab3b4efb44d960fff8e96b61e8500eb1caf9141553a15cf98fe53ee6382ad9042f0b533034211f8fcd3813b9d7c7d487c6db7730832d2c8cbbb2e0963e60e1ad04c1b604151288a2ab1a2e7bde07c2b69ca1e1d83ea2b7a762ab234c75803948d11d27edaf1c4a68d9ab96af3166", 0x8a}], 0x1, &(0x7f0000004100)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r1, r2, 0xffffffffffffffff, r1, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r1, r2, 0xffffffffffffffff, r1, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r1, r1, r2, r0, r2, 0xffffffffffffffff, r2, 0xffffffffffffffff, r2]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c}}], 0x140, 0x4000000}, {&(0x7f0000004240)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000005600)=[{&(0x7f00000042c0)="c049486f852719d2f52cc34b64b82dcc4360d391181ce05977ec792e4cc4355096140256249896c343be27958f3eb3dab6d2cad990e2e85b79e4f384b98181e58840948e9e846d8562ae41e400486e03786d1fc0bd29c1956b5ab62654ab0589c1cfc7cce1aeaa0aea33ee59733acf7235bd0286a8ecfd270f", 0x79}, {&(0x7f0000004340)="d76ede57ef2f691426507f0f97b82b61e8e782cf5d0603e83eda0712ed3287ccc2bab0bead6694ca3697e0dc5c38f42094891f8ccbd34b7f90ceb4ed0f38942f89ef0d133d39319d0835ba29c18d1dec508b8e1586260a3de48dbd5666f466ae7382a1ba6b8d0ea67c2b012abf6bdd84ac83579e8fdb9d518b4bad74e55e613ce1e18322af5366608ae4f191c3fb89b89480f37484be32fe1974f7247a0411903fc24230715613752ffb264b4fd25f5bfff0b8c4ef714616664e2544656311e3031f1294e67de796be4995ed1c12a9084495795ce15ed906ba2f6faf1351bf4e7f09abfda1b2d9d82353e773d10ee2661da854a851ec9a9a6ebbc0dbd3dcac078812e5d4521b0d061c27b6ec2b2519a18db458ad254f66d15981865b9554e33d3ba68bd6d5b7dc46a2e7b35b0383d1cb6f99bab1abeb6bcbe4646b76a97fffe26e5ebd69781ab33d8682f7eb086ce5dbfd838c147b3c8815c3e4d9f53cd12a5489bba48e53bdf9bf80d359e748fc6a21fe988ddddae7ec7c5fa9b5c57dc9c3e8eeed6dc9fb2ced0e6cc5b1b314b6e90b6deb5eb5cba51f990688b8c3fac8ccc63462fbd0eafb05aad179a4d906c63712112f91cc023c271fb4e6ea28287ca304673e02ba7980d5f80336eef91279fddda77de9b3791cf33d100c2b8b6b65355c55410e39a529ce5e2ed40264dcd79c2407add5ee5d7443f1f503ac5e604a3d2e2b53f8ebbd5442be33047e039afa723c453bec9ca61df49de9048230d11fa9d2220f99e0eebadd0556c606e809d638e486a9aa0343f5779970647d1eb5b9a9267775227b8073b84c798e6f55aa97d8731d3dd1f2277ba15b2984aa07cffbefbd4adcdb7c43e451af6643f370ae6733123b0c8b019557a6379a87e6471ad0c82ddbaf563b446eb22214408512fd72ea57720e79389d46ab7edc20b3c1eba8e673fb7bff9beefc4327cec0b17a5018b41c51c27881f6f438ea378ecf0bce6c75ab94b2eafd5a11e3a34bb511aa9305004f87bfdc919517d26144b1abd45774b5dfbf2ba09806e07c7e21019eef87f51dcadd48b693f7d828e8d225f87c69ed68dbe649dd474471e973ed1b4efb31bfa53c1fe418e85d046aa90d5849e467abde765c57cfd31a8eb4b2e77ef29f427a27ed689c6b7b3fc7c09834c5761a3ac825b8ed31a64bb51dce9bed57d74f2d9820c7cecc1e73681b0d26083a6a4232569e61860311240e3481bd82e070d62ce89d7d72a38901cbaab6aa30ec9e89c592a56eb9c6e260b9719e481f4ee2eacbeb9b37c696600227af3a96877fb62f91fd5458b62f77f25350833200d40cbc2dd184e3f7878f7ad87712060ca8b6ed4b7a6c3ed7f651cc3fefb4b8be91761707388e73432290c4e4478e424d007a8e7356eeef3df489d8be83253e27f564bf8a418023ca1de06b3e25798206dac598b853bc512dd919a08efd82fa6177ffff43a000790b7716df846c909d5ad7447777d4c30d7a219e916933fd6de0fb525b5d648985f4450a49ef0dcbc4bf13095e0478d77d2e76d511a50e25ee6c362a52f1d6ed2c65c32004c0f90fc39e99b5379a6ac64b1ac6b8dbc8abd9402a873e043da493e49c729fb84102d26ac2051042f5d5bbbf8d0b8377bba9b00c7137d5a75ffe762c1863ca2656310b0ead9c6c98a3751113ade912e175dffcb425f6d560c76a70729687229f6df5abadb7abdbdcb71d8ecfc0d204d35e29277849001964557e8da74a62f8e623e5264e40a5d890e7cf666923995ed5339669a282d31278005dae60fdb72d261f6a01025edab64f6870b47b9ecab9cf68814d4843b85416b16d6f0d14a55a0f94c6e8b9893182cd6cb84c952cf57471f16710dc536b81d77c78244acd57b334a83b95411f8bd0a9d0134448b095de10296b8bedc65d0391532243b5c6e40acde9cef6f81465b3934059b2d376430a6575aa6cfcdfed95e7f73fa6e62f32af15e03254e799746ba5b01b1bef3b6c46ba47f5b5bae9b5a553bc1cc3235cf986c33f7b42e4d2e7510f7084b6645ebeaf7f4325ccf86685ec9930c33ce0dfcb5d7afc820504ee8f3907b765cbf675a7ac30d4efb32e8d288107c5549b01724ad4cf7e15d45765e789def6fbed466e2dc3b258c22e459c238fa37c83072dff839c85846e2df1223903a47555b6659075a98176a39d02d66b97e320ed54ac032e4491477a8859f0f9a6a0911dab460465719afe497fa64aff498906fa2c8fb8bcba59b87fa95ddccefaf52e6b67613f562f72b7cd79bc36834b5aea50370f6591011d36a2ee92c88bf6bbe40f74708edf8598cb6bc8586f1365f73440d3be4b8d238ed10648c7d324640cbbba4d2107cdc31849dda035e3ebd0c90939a10f3546b536c713ba74cdf213aacc949af29a310a2cd2646aaf1bfc3a43e65db11c287ec36f7953e96b921cbd8604f70e56a697a72526d6c3308b2c9477ac4a4968691560ed33a75975339e6a76dd8014280cf6c28f792e21468e3a8ee9dc6d2705a938541ae363d0dbe209bc33188d96b41611651164802253e8f79aca0ee6c74cedb3141776225054adb1484f00afbd157f0701a3bb6ef3d15a095dfc1f1ec5f6a9fd4c957f2597c04b238f31596c634f291692eef022212c31ee46fb53ddcc65186c7d4edcb8cfd897ecd3b4cb9fcbd5d91f61699f83eb324a1ca2a728531d8815e8ee1a5fb3255289f2e0d1b080d5ffb4c0fe14f5e2e29b3255fbe185df051a78bb016b53de1ebfc0b394a0dd4e8252a51357dfa2530080d2d18367cc0f4960d7a4fff4fac95d7e15cf907a9d9930275f32e4391ae64fc8582703b4c6abdd3e8956ad87577bbd5ca4f7d14493c73a85d5b0cfa7e2e961422ad9f22793a1a4702193ba010bbc13f32de04afe6e93d285c459b7983fb05c3761cfa3edf6556e767f738c6294698510e222fe512fdadd3df499e3e9062950de7c2eb90da49bb12f5f53d77fb88fc658b8e4e854f70d6433246cafa457ae6b34e3dbc60cb4609a63d3c59b165c1d1343663492bc5109425cdac2edf4f279baa6432ed0f4a2204cce031eb0a8e427dddb2bf1bd33c5d49a22ee8782ed63de5a7051d37ce6ccdd108dbc6e19b7939f3fbf6a2d4a2a4ded414571a82db939cc9a55420b0e7ff0145de8e3a6308d8290e5c80cc88c6877407fd73f5c3cca5fc221cc917ac7c4ba70577cb482c1b54062ad23ecbd33be6e13cce50b4c6ef765f8b0a04775c1db7e34d76fcb8be696ba9d5d2f353e83bebb2d933ea22cbf8c66756b2eef6824305b1faffa0488c931eb281bee531e55a7e505ac140e2799b3385799103d7799ab9c7942465254861790609f847ce6a4978db8c4be2621e251aedad6549247cdc4c21f120e6b78869208288a4e3da00edf994b14b07539d6ff977e71fc3b00fea1a219552f0feeda641642ce67588b7dd1a45f35cbd505c26b16d7f837e589eddc518acb431f3a1d0212fb9fa693e104d5532f2d39a34e5d09d9b5cc71adb0289d07195259b1eef7097109a4324215bfd91fbcea37074410cf116dc330e5ae6fb5bb95c895c02e769c7e8514abbf724b77458f700b3cb296b79722fee078e89eb99e742e44a00db8c1d584b77054dc169e2900867d82236a88eabb1d3000b9a54fce048d6be3a220b955c3f380fe80e2c1c98c470f2de8c1e3173af1731556d21b52c243356abcaef12ef6b43e070fbb2c72d6fe17f721fc6900f1a2ca5d6f0e38383229e551e022ee0dc1cd0435dc463c5794a5d7682311c543645feb1de18d053507c29424019b6b691c8f541e39522e7b7f5649c8f3d7e18e67214a961299216c558f941fac857afbdc30b11bcddee4e9b6bdefb0cedf74b07e2f83815aedb936ed9300fe3f65b927edf933a5406c79a649752c1c9fe2e9832cafe860120961fa6b8aed55b8edf5f7ee49ee21a2e2348956b7b71c431bd97ad8f6667f3b591754551d2d7a556a2a57d7e1680dc312eba6dfb99feccdc6f28e70d9fa7c625b07b387e86a23b3b0ed19d0842af88d211d8f4ddccdc7206c807c778f85fbc5449d322108fb92ef9e0146c45ede314915412e1ea84f82d9b314e9de97fbb4c9ea39604a46caa3ddb8b7065e20d808e02dc965cc70cc11116d886379f0bd6c590da15c078faa5f3154fcee5e53b3097288730ae11cd0bbbeb4d4c2032dcccbb7e4eea7bec6a89e4f0a68412deb9e313aa927da3013b5b602fd3354d231c3f9e992a004fcc529673661e79d3acc6d238f3a87054a9e0839d53ffd3898e93433a4e20f92fc79851bf604f92c51930774dee3adc1303760f3172404ccef252e780e7f33be549ad6f139462ed41a7e8a488311ac47818ec07cd75f43df24498f1835601a04f9396b8ee3d738fb32a21c103b3c7bc39dbef0af3383c15adc0069d96842ddb258e39cfc3ebcea0591234ff8463d8a2ca22d44ae29a6362444a4d6c6cf03b3b55d63495d3a9a8898a14febd8ca67143ae7c7c8ed0d66a273248e2191ae30fbcef337536e32cbc24b57f9ee3d4e1bd72ea317bc9221156b37dfd26809db8ddb364e16878d6aafe3cb774135db87e457c5a6d6bdc99bb90b59e4f8490d3f72e25904166596d8f00bf422d6679f3f25ea35a9d32d4d79fca44bfc26ea4eb1956f8fc7dfc30ad540a819c7ec086e85d35e8ee8464278f3d892604d9c2a1a0d00500350c4560d799220e1fda141fc56f369ea7c444aa5d0aef6ad049d00e4353d479ada828d00e1918731d957efd085af07637a25550b71cd5a64ab1b032e1a9d36e64d8b13a89c287aafa3cb220cbb9ccc34690fffe0181837c3fbf7a28a515e92e049d0a79a1853fd0e06acb199d9bbaa936ffc5016232d28f8729ccb4e33d21a9c2352eb7c9efa7f72f74f86aeb3cbbf49abc1ff74dbb2483adbddf4b482eb4df8379ea9ac31225b3095bd03b21f1dbcfade9e9960407e99c16273f6fec6c145a20b71799a8153bf697abc002a3a09d8aec9d1287703615384e5df42c0ade181f1c453335fa175ea039eb02f5cd6249f51ac989a81bfa903ab4694b8c053747a1c5491e591835b19c04bebcd64c334db8116067a580aace6f212c09b2a8ef7f866afa5ac8007b84b317971c0901fbd429238e3bc623fdec9201b0e8a93b2944204ddff414c0f6af9acf8b38fe212c85e661dae7e2bcca1f56ad5d243318cef5b21ce4001392646ed5142853f259cfea6146f0a4c7ff95c33215796c5e7faf3c0a3ccdb8b34ee5b285b9b8eac078aae95b75a13021fff5f555c736028eff1907e182c47bd3e30c6b7d95d2ad53bf20c18f0257c4dd2526747a0d46c84d3b5d3d2195e27fbd4fbc8173a114e4bc065dbfb2d6ad45e870024c6e4f89b4eaf5a36d7cce61d405a42c6adaa7ed31c91dc840f240981e654750dadc9d607ba0beab25aee6834250430a2747aed7c703fa4ab3921f3115a804a8fb5fdb894f80dd7a58ee0987b9c534816a109c87a60da50782ca13addf2257cab04485863bf72258e4c0a71fbed91a3e8f8910c237c106611232b4a1f783424a2ca464822cd9de262cbae2b74bbf7bdec82f20b16cf9a25f5dad86518e6d2e81df4f1ee426a7563e3998096fc0b2d11818d0c7946664b9701573ac922e6fc0148bfd4769ebdc7a4c095e3426ebb9e47790ff927966de48bbdc4e7282c28d5566789b3d1ffb5279a84ec62c0cd16652650764d4c86055d8e5f664216ae3e1e0124c18ad6dc9c7e9280771e7f5550fc828097bd347f4a017a1a80828de6911b0d8b00888872889e7c297c47c3b22d1777d03d4287d9b9d928a6ac388c0195", 0x1000}, {&(0x7f0000005340)="64d6ede37a3700ea4d45926cacdcd30af92fbab9be3316b05457b1c0f2a0b49c9a86e80a3b0dbbd16af1f56d3c949a67afa3f887c09696c5e0f9a20b7dac3aa6943f26c5e4d085e12d78bc2fb0fc903e631632168790d2bee4e1b5a6ccc6a4a4de95b2a6415d921d5c897e1199ed8a344f6d63afd38932a575d264535f4a0cdaa1a81b04da19e0da06343a0a6ef667fbf5b7870680cf900327b391c19987403de3e5cb6bc8f9d4e7de932829664e1c44b8cb391025512640985b6d0c4d10c25972cee3126e00514f02", 0xc9}, {&(0x7f0000005440)="e22c7a2a7f5d1983e4262d2838d23181744f5cd7dc0b1e5d6e3b92f932acca4a24c2e1c5645db35dae7aab9519a2c31084807fbe7112ae0bad6facfbc00a6088d5902e9b04752538a4e012fb17b719f1f4ad009aeff1cb0868196aee7c3a75f11b35666247185a049b1791cbf67472dcc1b1a2473085aab293aa48f1b4482dc810ad4faf2182bb9604897bbf03218a17b0fa8c453c1cab2a235f36609e7c5d51f915", 0xa2}, {&(0x7f0000005500)="a60f138191d6bfbf9667713616998e7ca7d12321f9187fafe6ce52e50232046caecc9715412a04055053b33f939932413ed955a463325bb252274cb95773c230effc9b06edeeaec044ab0efc4e6b1036a70ea4868835bfc12f58783a5e914f66eb154a5e0601a889cb55049ee4753afef6fbd64b89e7c30c7a40ec20bcc96cd004a18b41faf957e05ad9f3207b296b79365d698448fe97f8da70d976abd0f60cbe99b4683cce133ed7b99ea7d6", 0xad}, {&(0x7f00000055c0)="da52c2b737608a1a970d6aed762e985723711509e333ea710920070d28c066eacf8be3a318", 0x25}], 0x6, &(0x7f0000005840)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x40, 0x4000080}, {&(0x7f0000005880)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000005940)=[{&(0x7f0000005900)="9926a1c7c4ff3c937e740701ca14c3a6", 0x10}], 0x1, &(0x7f0000007cc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r10, @ANYRES32=0xee01, @ANYBLOB="0000000000010000000100"/20, @ANYRES32=r0, @ANYRES32=r0], 0x100, 0x4010}], 0x5, 0x4010880) mq_getsetattr(r2, &(0x7f0000000040)={0x100000000, 0x7, 0x7f, 0x10000}, &(0x7f0000000580)) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:10 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={0x0, 0x94}}, 0x0) 14:07:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000005980)) 14:07:10 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000000)=0x7) 14:07:11 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) fchown(r0, 0x0, 0x0) 14:07:11 executing program 2: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x40a7, 0x200) 14:07:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) 14:07:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00U\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:11 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) accept$packet(r0, 0x0, 0x0) 14:07:11 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) close(r1) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r3, 0x80, 0x1}, 0xc) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={r3, 0x3}, 0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 636.855338][ T34] audit: type=1800 audit(1604239631.310:240): pid=31840 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15794 res=0 errno=0 14:07:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x2, 0x101}, 0x14}}, 0x0) 14:07:11 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @broadcast}, 0x40}, 0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r2, 0x4141, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000140)={@any, 0x947, 0x7e, 0x0, 0xcd15, 0x8001, "678719a128194b47f54af5fddcc3d4755a7d9ccf5455d968f5898c8a935257aa7b2e7d41d2f8a68b1e63f4b52f57e5ef1afac3447da7a16c532eab2cf44de9e22839edec36b51c977025c1cb8acf1fc9c7c8d838c1d46682a34af65e252f057f446dc32d738e93fccc9cb9cc248f62533e3f6d3cb976b322c271f9e615827c49"}) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, &(0x7f0000000080)={0x87, 0x8, 0x2, 0x0, 0x0, [@private1, @private0, @loopback, @remote]}, 0x48) 14:07:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:11 executing program 2: pselect6(0x40, &(0x7f0000000040)={0x2}, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={[0x4]}, 0x8}) 14:07:11 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5b1ce898"}, 0x0, 0x1, @userptr}) 14:07:11 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmmsg(r0, &(0x7f00000026c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) 14:07:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x3c, r1, 0x1, 0x0, 0x0, {}, [{{@nsim={{0x2, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}}, 0x0) [ 637.486246][T31902] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 637.526450][T31903] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 14:07:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002640)={&(0x7f00000020c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002600)={&(0x7f00000022c0)=@getpolicy={0x50, 0x15, 0x0, 0x0, 0x0, {{@in=@remote, @in=@private}}}, 0x50}}, 0x0) 14:07:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00V\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = dup3(r0, r0, 0x80000) r2 = creat(&(0x7f0000000400)='./file0\x00', 0x0) close(r2) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r4, 0x80, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000040)={r4, 0x97, "38d276aa10b7cbcf9db57a1dd969a3478eddb3f5a4e6e67331184add04e289004b127e31f9fda5951dc44999c7a26f790ce3563a9c7607bb6d9c1861ba69c06625fe83b137cfd5f47e54e705bcad55158846a694dd2aa2a515c132b0cd618b1f736c8cfd3d8cd4569a0b6cc37708ddfa346f6fbe4acfd0debed1628a21262128f2edc5da3ef0f1d6a7b66cd1a5252516e41327ea69e412"}, &(0x7f0000000140)=0x9f) connect$nfc_raw(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x6}, 0x10) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:12 executing program 2: kexec_load(0x4, 0x1, &(0x7f0000000440)=[{0x0}], 0x1) [ 637.649921][ T34] audit: type=1800 audit(1604239632.110:241): pid=31877 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15794 res=0 errno=0 14:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:12 executing program 2: socketpair$tipc(0x1e, 0x4, 0x0, 0x0) 14:07:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$inet6(0xa, 0x1, 0x2) 14:07:12 executing program 2: getresgid(&(0x7f0000005c00), &(0x7f0000005c40), &(0x7f0000005c80)) 14:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:12 executing program 2: syz_mount_image$affs(0x0, &(0x7f0000001fc0)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:07:12 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:12 executing program 2: ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:07:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00W\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:13 executing program 2: ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) 14:07:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000080)='0', 0x49) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x8101, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f00000001c0)) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0x1) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="c3", 0x1, 0xfffffffffffffffc) keyctl$describe(0x17, r4, 0x0, 0x0) r5 = syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x2dc7, 0x200) ioctl$RTC_PLL_SET(r5, 0x40207012, &(0x7f0000000240)={0x2d, 0x10000, 0x7, 0x1, 0x5, 0xffffffff, 0x6}) keyctl$revoke(0x3, r4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000000c0), &(0x7f0000000140)=0x8) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000000)={0x3}) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 638.587317][ T34] audit: type=1800 audit(1604239633.040:242): pid=31920 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15795 res=0 errno=0 14:07:13 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 14:07:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) close(r0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fsi_master_aspeed_opb_error\x00'}, 0x10) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000080)={{r1}, 0x49, 0x4, 0xffffffffffffffff}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e24, 0x0, @private0={0xfc, 0x0, [], 0x1}}, 0x1c) 14:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$can_j1939(0x1d, 0x2, 0x7) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x1, @mcast2, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) memfd_create(&(0x7f00000000c0)='\x00', 0x1) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x5) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r2, 0xc0045002, &(0x7f0000000000)) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f0000000040)={{r1}, 0x2, &(0x7f0000000000)=[0x1, 0x3f0000000000], 0x3, 0x8, [0xffffffff, 0x1, 0x8, 0x7fff]}) 14:07:13 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = dup(r0) setsockopt$inet_dccp_int(r1, 0x21, 0x0, 0x0, 0x0) 14:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$SNDCTL_DSP_SYNC(r2, 0x5001, 0x0) 14:07:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}]}, 0x3c}}, 0x20000001) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000100)={0x10}, 0x10}], 0x2}, 0x0) [ 639.182594][ T34] audit: type=1800 audit(1604239633.640:243): pid=31965 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16017 res=0 errno=0 14:07:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00X\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0x1d}, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r3, &(0x7f0000000000)='0', 0x1) setsockopt$PNPIPE_INITSTATE(r3, 0x113, 0x4, &(0x7f00000000c0)=0x1, 0x4) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0xc63b, 0x3}}, 0x30) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r4, &(0x7f0000000000)='0', 0x1) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000000)={0x1}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r5, &(0x7f0000000000)='0', 0x1) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r5, 0xc01064bd, &(0x7f00000001c0)={&(0x7f0000000140)="b71542c68391135ed6a1f452567410bcb89457082494bafb1add6cddeec52df42e6aa0c2f79823788efed6f7a7211be6626d37a02d2dea994ec730cbabaf320cf377590369b6edc1f06ddb89309ec54d46b93a53d3d00c9b838149b8c28d36b08e5b9c42", 0x64}) 14:07:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) 14:07:13 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x101}, 0x4) 14:07:13 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000340)) 14:07:13 executing program 2: syz_open_dev$dri(&(0x7f0000002640)='/dev/dri/card#\x00', 0x0, 0x80000) 14:07:14 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000000c0)) 14:07:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e26, 0x4000000, @mcast2, 0xfffffffc}, 0x1c) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000000)={0x0, 0x400}) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) sendmsg$NL80211_CMD_FLUSH_PMKSA(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x801, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40) 14:07:14 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000005940)='/proc/self/net/pfkey\x00', 0x105802, 0x0) 14:07:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) r1 = getpgid(0x0) sched_getscheduler(r1) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:14 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001800)='/dev/nvram\x00', 0x1, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='disconnect aa:aa:aa:aa:aa:11 0', 0xffffffffffffff67) 14:07:14 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)="c3c4e6eb3510c4acf8dd81518e8329baa757226782a6b74559ee781bb7272a942e3fb832b38899b879420d258fdda1d0ffe3674040c28b690dcb50ab9b4f743a70283a46b6ba84a49bd0af6351c0bb63da4abaaf64fa7276bb9b8259ed2015f47b628e131f02dbf84bdfd4b4ce6f8dcb06cea67f6fa48ec5d56eae4f97f83455ed0f323589f0e9945142122ecf3150fe24fefef6cb8a9a944f10f26a3a01ffb6ec5b5999ae0600000000000000dbbfe6bdd7af82161ffbdf291cd12220e93ed66df061502491d5d05c27de56d517fdcedc94da89cec02f9c15ad067b98bbdfd7168ce03ae97b1b97", 0xffffffffffffff85}, {&(0x7f0000000180)="b909afa6e4ca6329771e3505e06478e226ecee0851e6636db21fbbd7bdf7484ba01625f525458f91dc84883ff48b15832f05392bff86db754314c9557a600cecedc4103103a72a4334010bcc95cb78dc08664be6a165bb42dfdfa109510492695b887ecb555fdf15e19270e0bad7016c4061f10d9de560e58ce572fb8580d6faf78b4c7ac7a7a7fedda5c0a90bb31d11ad05dff97a31ce35fc447a0bb71f7236363082216f6d", 0xa6}, {&(0x7f0000000240)="776ffa6d5b1251856e9b37921ec78f482dc64ab7c657af0e856bc616316649709323972559a1f56c17ebd40e63b9f4fefb82b1c1e28eb077a0b8d89ee08815877884960c0ce121e74fbc6a39a2b49403797ba0518f7db0", 0x16}, {&(0x7f0000000000)="7268581004aa2a9ef5be6532f76a42cdb3554fbefd16d34b8208d814adc459808a1a2f95ebbd7e498ab4e828efb544", 0x2f}, {&(0x7f00000002c0)="02f4144cdd539a2b640692f29b0673bf5240619cfd5c6cb1c5f0ef2705c3646a67cb4446ec63362865e43b1786c4c4b817f27b15d8a5597770c2c325c4891f6be19a36124265620a91c575286314992665b536157e396d63a0de42bd757bc8794a90d463e1b9cc7f584c87c44b942435a6b472a008ddcb9ee6a29b8033a16baa85b2bda011b0630092768b694cfbc99dd07833af79f42c05c5ef318a35ba6f78fd01845b28176dcb2c29671167d6f3c59fd418acd29fb5a4c797ac11b91a60a1f9459e3e0b0d3ca88e52a7f1a8a7cab38c4fb0e6c95383bf2be9b735f8d40ed4af1cd4eb955fafb96a5d1079bbd150dd10f615207d55f2394e", 0xf9}, {&(0x7f00000003c0)="df11a7b4af5dd4a3ef32d2126d626bfddbd4e74bc902d77c8c1d16269471d1e29d3655e7fac3", 0xfffffffffffffd13}], 0x10000000000000d7, &(0x7f0000000480)=[@txtime={{0x18}}], 0x18}, 0x0) 14:07:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00Y\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:14 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) 14:07:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) 14:07:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x7ff}, &(0x7f00000003c0)=0x8) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000340)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x48000, 0x80) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getsockname$unix(r1, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x38, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x81, 0x0}, 0xb5}, @in6={0xa, 0x4e23, 0x9, @mcast2, 0xfffffffe}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r3, 0x40, 0xa70, 0x6, 0x7f, 0x8}, &(0x7f0000000180)=0x14) geteuid() sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 640.283988][ T34] audit: type=1800 audit(1604239634.740:244): pid=32009 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16082 res=0 errno=0 14:07:14 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, 0x0, 0xffbe) 14:07:14 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000040)=""/26) 14:07:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x6e32, 0x210001, @remote}, 0x1c) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), 0x4) sendto$inet6(r0, &(0x7f0000000140)="c9fef830a2fd8907fda8d2c134a1fc0da273c9c28d54a07e2330da7ba065259e5931a02ba2b1444cb20682b9c6a9d6294f22ce64826ba503a562af05a376f8789436cfbcca728da49b74c676097b6874b69e10794a7ab533565669a33a717a46f044960a9c", 0x65, 0x40001, &(0x7f0000000000)={0xa, 0x4e24, 0x9, @empty, 0x4}, 0x1c) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) 14:07:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 14:07:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x9, 0x5}, 0x14}}, 0x0) 14:07:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, &(0x7f0000000000)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40000, 0x0) ioctl$CHAR_RAW_FLSBUF(r1, 0x1261, &(0x7f0000000080)=0x1) 14:07:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x7, 0x4) 14:07:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00Z\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:15 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f00000000c0)) 14:07:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) getsockopt$IP_SET_OP_VERSION(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000000c0)={'veth0_to_bond\x00', {0x2, 0x0, @multicast2}}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_open_dev$mouse(&(0x7f0000000780)='/dev/input/mouse#\x00', 0x6, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000007c0)=0x7, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x121202, 0x0) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000180)) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f00000000c0)=0x7) ioctl$SNDCTL_DSP_SYNC(r3, 0x5001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20000120) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) 14:07:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8a02, 0x0) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xe8, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_VENDOR_DATA={0x80, 0xc5, "d01ae5896349ab04130f13a28e9af2b00438fb911799ac27326939530e413c08ac408c2d88fabec8c608769f8a4ee323158761f42587ddb17205b23d968ce553ad8ae2e2d2e6329bfb919157702caf4b5e70931139e531a1b2764871b6f6f5677dabfcad14d28b3074e5906e3242649a923d6ae7bcfe9814e67a26a8"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x5}, @NL80211_ATTR_VENDOR_DATA={0x4}, @NL80211_ATTR_VENDOR_DATA={0x38, 0xc5, "c007430aed12e647414d74bb4492da37d7562a745fca84521a44b717577ab126ab336a4b0d5583c41b0611e6836ec3a3c706b91a"}, @NL80211_ATTR_VENDOR_SUBCMD={0x8, 0xc4, 0x4}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000000)={r1, 0x0, 0xffffffff, 0x269}) sendto$inet6(r2, &(0x7f0000000040)="18", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x3, @loopback}, 0x1c) [ 641.385074][ T34] audit: type=1800 audit(1604239635.840:245): pid=32053 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16257 res=0 errno=0 14:07:15 executing program 2: getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, 0x0, 0x0) 14:07:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = getpid() ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f0000000040)={0x0, 0x5}) syz_open_procfs(r1, &(0x7f0000000080)='net/psched\x00') r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r2, 0xc0045002, &(0x7f0000000000)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r4, 0xc0045002, &(0x7f0000000000)) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000100)={r2, 0x1400000, 0x100000000}) ioctl$SOUND_PCM_READ_CHANNELS(r5, 0xc0045002, &(0x7f0000000180)) kcmp(r1, 0xffffffffffffffff, 0x4, r2, r3) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000001c0)=[@in={0x2, 0x0, @empty}], 0x10) 14:07:16 executing program 2: socketpair(0x15, 0x0, 0x0, 0x0) 14:07:16 executing program 2: socket(0x23, 0x0, 0xba) 14:07:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/partitions\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfff, 0x280000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000040)={0x2, 0x87, 0x81, {0xfffffffe, 0x9}, 0x80000000, 0x2}) 14:07:16 executing program 2: syz_mount_image$squashfs(&(0x7f0000000340)='squashfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)) chown(&(0x7f0000000c80)='./file0\x00', 0xffffffffffffffff, 0x0) [ 642.529136][ T34] audit: type=1800 audit(1604239636.990:246): pid=32098 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16273 res=0 errno=0 14:07:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00[\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:17 executing program 2: select(0x40, &(0x7f0000000000)={0x5}, &(0x7f0000000040)={0x7}, &(0x7f0000000080), 0x0) 14:07:17 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, 0x0, 0x0) 14:07:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x7, 0x4, 0x3f0, 0x1f8, 0x0, 0x110, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000000), {[{{@arp={@remote, @multicast2, 0x0, 0xff000000, 0x4, 0xb, {@mac=@broadcast, {[0x0, 0xff, 0x0, 0xff]}}, {@mac, {[0xff, 0xff, 0x0, 0x0, 0xff]}}, 0x9, 0x5, 0x2, 0x6, 0xf000, 0x6f5a, 'gretap0\x00', 'ip6_vti0\x00', {}, {}, 0x0, 0x77}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, 0x1}}}, {{@arp={@loopback, @rand_addr=0x64010102, 0x0, 0xffffff00, 0x2, 0xb, {@empty, {[0xff, 0xff, 0x0, 0x0, 0xff, 0xff]}}, {@empty, {[0x1fe, 0x0, 0xff, 0x0, 0xff]}}, 0x5, 0x4, 0x800, 0x7, 0xbd, 0x3, 'ipvlan0\x00', 'ip6gretap0\x00', {0xff}, {}, 0x0, 0x40}, 0xc0, 0xe8}, @unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x1ff, 0x77}}}, {{@arp={@empty, @loopback, 0xff000000, 0xff, 0xd, 0x16, {@empty, {[0x0, 0xff, 0xff]}}, {@mac=@local, {[0x0, 0x0, 0xff, 0x0, 0x0, 0xff]}}, 0x9, 0x7, 0x7, 0x20, 0x1, 0x10, 'xfrm0\x00', 'bond0\x00', {0xff}, {0xff}, 0x0, 0x60}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@dev={[], 0x13}, @local, @dev={0xac, 0x14, 0x14, 0x29}, 0xa, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) syz_open_dev$vcsn(&(0x7f00000008c0)='/dev/vcs#\x00', 0x3, 0x402001) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @private0, 0x2}, 0x1c) 14:07:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x3, @local}, 0xfffffffffffffe35) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000400)={0x1060, 0x0, 0x5, 0x0, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "dfc47484a0456462fdafa7283a96371b7cf0746ec2ffbbabe9b7b4b735a1e039", "0cd0158f725dcd565f0dffc1fd4bcad1f2889bbef3db6301b4db98abea266d29"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "c50266b290a07d063c9141e801c6095bb9185d585384400b13e1c344679e3496", "75a10f0c2d341345596756edc32dda35dea0a45d121f693bb248c8cfe17e9097"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "0dce9942b11dafdd7efd144ee5c4a635544545a8244ea9718b107095ce37967c", "d9533f721cf6826764d7cf05055e75ed2fdd4228bd7f76ae3b6d58b3b1a65cfb"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "482c9018ecaf1669170e36c5a63e9944189b4eac6092a1e5b3873728d97a9047", "684f9d00e220fe529b9eb9b1354a5b154ad89597acdd2f8aa090a48cab7ac5c8"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "3c46f62a6700652647072a6956ac246b09690e15f7bac50436d14143b1ab1da1", "9acab300bc8a995cf7be5ba98216bc5770cb5b419d6e23c3b63b463ee6fcb05a"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "1a7f84fd3ee88bfdd527f6d6f779737fd6140f30084e15a5d9f2e024a1c34010", "d1dc0db8b222b7e7a858e66dcdce70631eeae3cd14c8619cb53ee9605261cf57"}}}, {{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "1afe6121895b29e0119a6a88765eae42435b63fabac5be879f534d110a8d78f0", "eeb47ca915205e06b2558e728a42736c4430917c85df41d2e477e23fc670002f"}}}]}, 0x1060}}, 0x0) 14:07:17 executing program 2: setresuid(0xee00, 0xee00, 0xee00) 14:07:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r1, &(0x7f0000000080)={0x2a, 0x1, 0x7ffe}, 0xc) r2 = socket$qrtr(0x2a, 0x2, 0x0) bind$qrtr(r2, &(0x7f0000000080)={0x2a, 0x1, 0x7ffe}, 0xc) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:17 executing program 2: syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x80002) 14:07:17 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x0, 0x0) 14:07:17 executing program 3: syz_open_dev$ndb(&(0x7f0000006940)='/dev/nbd#\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000006b40)='/dev/nbd#\x00', 0x0, 0x0) 14:07:17 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f00000031c0)=[{{&(0x7f0000000200)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @private}}}], 0x20}}], 0x1, 0x0) 14:07:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00\\\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:17 executing program 3: socket(0x1d, 0x0, 0x2) 14:07:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x3, 0x2, 0x101}, 0x14}}, 0x0) 14:07:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x6}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UPDATE_FT_IES(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x20, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MDID={0x6, 0xb1, 0xaa}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) read$sequencer(r1, &(0x7f0000000040)=""/144, 0x90) [ 643.421333][ T34] audit: type=1800 audit(1604239637.880:247): pid=32144 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16374 res=0 errno=0 14:07:17 executing program 3: add_key(&(0x7f0000001440)='asymmetric\x00', 0x0, &(0x7f00000014c0)='Vp', 0x2, 0xfffffffffffffffc) 14:07:18 executing program 2: syz_80211_join_ibss(&(0x7f0000004fc0)='wlan0\x00', 0x0, 0x0, 0x0) 14:07:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty, 0x20000000}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='\x00', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x315, @private2, 0x82c}, 0x1c) r3 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x2, 0x713803) ioctl$MON_IOCH_MFLUSH(r3, 0x9208, 0x2) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0xf3f, 0x5) dup3(r0, r4, 0x80000) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r5, 0xc0045002, &(0x7f0000000000)) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000080)='/dev/vcsu#\x00', 0x0, r5) 14:07:18 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x40000103) 14:07:18 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x0, 0x0, {0x0, 0xea60}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ba2f7d3"}, 0x0, 0x0, @userptr}) 14:07:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x105) close(r1) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r3, 0x80, 0x1}, 0xc) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)=ANY=[@ANYRES32=r3, @ANYBLOB="f900000032b69fcd2551535cbdd7ea16791c8e66b7fd13a7a011a297ff13d474027a7efbb3f41ad92fce539d6515a8dec7938f19e42204fff38a2b9fc5bba19b6eebd3f645d9e589f84ad6ee428d791b0a9e3109f6ce87da2b4150dfe4d09e0027a96c95e021cf2cd5a43118a2b3deb90d9bffbde7d412fd84ef62b21892507accdebbab0404e8fd5f682ba4a44789d27d50dbefa8b4059bf11b3e06fb45fb1e04ce6b4c0ad6465afd2379d0565b847aa20787daa6d314b6951b375edfd14d29c5ed4d70444981b1cbf374430f53163d949e0a96b5b0240ebcfec63871f12002c8adcc8900"/253], &(0x7f0000000000)=0x101) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {0x0, 0x0, r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"d240a52be20df3e1425df9067934810c"}}}}, 0xa0) 14:07:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, 0x0, &(0x7f0000017540)) 14:07:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00]\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:18 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) getpeername$netlink(r0, 0x0, 0x0) 14:07:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r1, 0xc0045002, &(0x7f0000000000)) ioctl$SNDCTL_DSP_SUBDIVIDE(r1, 0xc0045009, &(0x7f0000000000)=0x2) [ 644.334998][ T34] audit: type=1800 audit(1604239638.790:248): pid=32202 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:07:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[], 0x3c}}, 0x0) 14:07:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e24, 0x0, @loopback, 0xfffffffe}, 0x1c) 14:07:18 executing program 2: add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="aa", 0x1, 0xfffffffffffffffc) 14:07:19 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x40000103) 14:07:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:19 executing program 2: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 14:07:19 executing program 2: r0 = socket(0x2, 0x2, 0x0) bind$netlink(r0, 0x0, 0xf) 14:07:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000e40)='keyring\x00', &(0x7f0000000e80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, r0) 14:07:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={0x0, 0x7fffffff}, 0x8) 14:07:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00^\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:19 executing program 2: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) sendmsg$alg(r0, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=[@iv={0x18}], 0x18}, 0x0) 14:07:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) write$midi(0xffffffffffffffff, &(0x7f0000000000)="29569fd499052ab51cac5306b529e4c440e399", 0x13) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 645.219268][ T34] audit: type=1800 audit(1604239639.680:249): pid=32221 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:07:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/192, 0xc0}], 0x1) 14:07:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback, 0x1}, 0x1c) 14:07:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0xc8c5) 14:07:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000000)) sendto$inet6(r0, &(0x7f0000847fff)='x', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:20 executing program 3: r0 = socket(0x18, 0x0, 0x0) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x74}}, 0x0) 14:07:20 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nvram\x00', 0x0, 0x0) 14:07:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000e40)='keyring\x00', &(0x7f0000000e80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000080)='.request_key_auth\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:'}) 14:07:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x20080000, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:20 executing program 3: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) 14:07:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00_\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:20 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)='K', 0x1}, {0x0}, {&(0x7f0000000300)='q', 0x1}], 0x3, &(0x7f0000000080)="97", 0x1}, 0x40841) [ 646.009768][ T34] audit: type=1800 audit(1604239640.470:250): pid=32261 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16177 res=0 errno=0 14:07:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="50222e1d317b85d2c04ce951d40f3d3ac4544a45aef5929138ffdc74d3c05a72fbccf3d0a5da9abf966d276f03c7a1852dbbb497e156b7faf1c94e5b4042e750becaa11b466ba2c00dbdb4fd888ad4121de0fcfed1", 0x55, 0xc885, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback, 0xffffffff}, 0x1c) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/153) 14:07:20 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000018c0)='ns/ipc\x00') 14:07:20 executing program 0: ioctl$vim2m_VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000200)={0x6, 0x2, 0x3, {0x2, @win={{0x4, 0x3, 0xce, 0x6}, 0x2, 0x8000, &(0x7f0000000080)={{0x5c, 0x6, 0x6, 0x7}, &(0x7f0000000040)={{0x7fff, 0x8000, 0xfff, 0x3}, &(0x7f0000000000)={{0x8, 0xfffffff9, 0x2}}}}, 0x9, &(0x7f0000000140)="18345b93bb2c4d747929efb970e61f66210a98d64800db4206353daa4d07049639bf70c1d258219c105dfb61c4a59304d6fb0c9c1260ed39939bb0038b86a3e4093ebb666ce68c373d47e1c9c1f9df7d2c5038ad305d38b30addcaf23409233c37bedcbba1c3d828b06cbaf76028a6572dd4ab8daeefee36a57a87cf78c56dc25add4284bd23ea061524d7e4af82b0131b347ee5b1a0493e41d21935f42338b594a84e15b0297a418c", 0x40}}, 0x1000}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:20 executing program 2: syz_mount_image$ufs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{&(0x7f00000011c0)="f9", 0x1, 0x62c8e947}], 0x0, 0x0) 14:07:20 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001ac0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/187, 0xbb}], 0x1}}], 0x1, 0x0, 0x0) 14:07:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000200)={0x7}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) r3 = accept4(r0, &(0x7f0000000140)=@caif, &(0x7f00000000c0)=0x80, 0x80000) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x20}, 0x8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r4, &(0x7f0000000000)='0', 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', r4}, 0x10) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000000)={0x0, 0x2, @raw_data=[0xff000000, 0x81, 0x3, 0x4, 0x3d, 0x5, 0x200, 0x9, 0x83, 0x1, 0x3, 0x7f, 0x101, 0x1000, 0xffffffff, 0x6]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 14:07:21 executing program 2: syz_mount_image$ufs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001200)=[{&(0x7f00000011c0)="f9", 0x1, 0x62c8e947}], 0x0, 0x0) 14:07:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x80000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 14:07:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e1f, 0x0, @empty, 0x800}, 0x1c) bind$qrtr(0xffffffffffffffff, &(0x7f0000000000)={0x2a, 0xffffffffffffffff, 0x3fff}, 0xc) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00`\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 646.989341][ T34] audit: type=1800 audit(1604239641.450:251): pid=32297 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:07:21 executing program 2: r0 = socket(0x2, 0xa, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 14:07:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:21 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc) 14:07:21 executing program 3: r0 = add_key$keyring(&(0x7f0000000e40)='keyring\x00', &(0x7f0000000e80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, r0) 14:07:21 executing program 2: 14:07:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty, 0xfffffffe}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x706002, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r2, 0xc2604111, &(0x7f0000000200)={0x0, [[0x6, 0x7fff, 0x63, 0x0, 0x6cb, 0x9, 0xff0, 0x9], [0x7, 0x0, 0xa4, 0x1, 0x0, 0x4, 0x2a04, 0xff], [0x8, 0x1, 0x0, 0x0, 0x3, 0x400, 0x40, 0x7]], [], [{0xffffffff, 0x1, 0x0, 0x1}, {0x4, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x5, 0x5, 0x1, 0x1}, {0x7, 0x0, 0x0, 0x1, 0x1}, {0x1, 0x800, 0x1, 0x0, 0x1}, {0xffff8001, 0x60000, 0x0, 0x1, 0x0, 0x1}, {0x8, 0x6, 0x0, 0x0, 0x1}, {0x56c1, 0x4, 0x0, 0x1, 0x1, 0x1}, {0x5, 0xebc, 0x1, 0x0, 0x1}, {0x850, 0x7fff}, {0x7, 0xd54, 0x0, 0x1}, {0x8000, 0x9, 0x1, 0x0, 0x0, 0x1}], [], 0x2}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r3, 0xc0045002, &(0x7f0000000000)) close(r3) ioctl$HIDIOCGFEATURE(r2, 0xc0404807, &(0x7f00000004c0)={0x6, "c4dc790a9ee5ec296ce85a47b88b6da3acec10cea22efe7e3b3c737e0caa2d8456e8bdca135925dba135715af3400ac8b8679d05e4572904239598af502bc1a1"}) write$9p(r1, &(0x7f0000000040)="dd686d6cc356eb341020b77372b2333a410f8650cdbc13c44ae2c6b9ede988be26f5147cf986b82eea73a1fe61644ffe702b2b989020cdf7465995cd76604d7324c08c1a741e80df0f61f76283a27e03177874db76e681c90f3b994e333a44965a7fb6b3a0eb53dcb27e3c20e7e0907990cb9bf23c092268b592a61befc1c58ff559", 0x82) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r4, 0xc0045002, &(0x7f0000000000)) ioctl$F2FS_IOC_DEFRAGMENT(r4, 0xc010f508, &(0x7f0000000000)={0x6, 0x2}) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000180)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x2, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r5, 0xc0045002, &(0x7f0000000000)) ioctl$BTRFS_IOC_GET_FEATURES(r5, 0x80189439, &(0x7f0000000480)) 14:07:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000004c0), &(0x7f0000000500)=0x4) 14:07:21 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000005000)={0xffffffffffffffff}) getsockname$tipc(r0, 0x0, &(0x7f0000005080)) 14:07:22 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$apparmor_current(r0, 0x0, 0xf) 14:07:22 executing program 2: getresuid(&(0x7f0000000080), &(0x7f00000000c0), 0x0) 14:07:22 executing program 3: socketpair(0x2b, 0x1, 0x5, 0x0) 14:07:22 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00a\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr, @dev}}}], 0x20}}], 0x1, 0x0) 14:07:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0xffffffa7) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:07:22 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) fchown(r0, 0xffffffffffffffff, 0xee00) [ 648.022584][ T34] audit: type=1800 audit(1604239642.480:252): pid=32344 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16374 res=0 errno=0 14:07:22 executing program 2: getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f000000f0c0)) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 14:07:22 executing program 3: r0 = socket(0x15, 0x5, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) 14:07:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = signalfd4(r0, &(0x7f0000000000)={[0x5]}, 0x8, 0x800) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x2, @private1, 0x6}, 0x1c) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x20) 14:07:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000180)={0x0, &(0x7f0000000000)=""/201, &(0x7f0000000140)}) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty}, 0x1c) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x50, r1, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x50}}, 0x8040) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80) 14:07:22 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80105010}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10}, 0x10}}, 0x0) 14:07:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000d40)={0x14, 0x0, 0x1, 0x101}, 0x14}}, 0x0) 14:07:22 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg$inet(r0, &(0x7f0000009940)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000002540)=[@ip_retopts={{0x24, 0x0, 0x7, {[@ssrr={0x89, 0x13, 0x0, [@empty, @private, @broadcast, @private]}]}}}], 0x28}}], 0x1, 0x0) 14:07:22 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x12142, 0x0, 0x0) [ 648.977381][ T34] audit: type=1800 audit(1604239643.430:253): pid=32392 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16178 res=0 errno=0 14:07:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00b\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:23 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg$inet(r0, &(0x7f0000009940)=[{{&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000002540)=[@ip_retopts={{0x24, 0x0, 0x7, {[@ssrr={0x89, 0x13, 0x0, [@empty, @private, @broadcast, @private]}]}}}], 0x28}}], 0x1, 0x0) 14:07:23 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) recvfrom$rxrpc(r0, 0x0, 0x0, 0x12142, 0x0, 0x0) 14:07:23 executing program 3: r0 = inotify_init1(0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 14:07:23 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5b1ce898"}, 0x0, 0x0, @userptr}) 14:07:23 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockname(r0, 0x0, &(0x7f000000ec40)) 14:07:23 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f000000d680)={0x0, 0x0, 0x0}, 0x40) 14:07:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000018c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001880)={&(0x7f0000001800)=@getchain={0x5c, 0x66, 0x2, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xffe0, 0xa18cecb3e1b5406e}, {0xa, 0x3}, {0xfff9, 0xc}}, [{0x8, 0xb, 0x5}, {0x8, 0xb, 0x1ff}, {0x8, 0xb, 0x699}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0x3}, {0x8, 0xb, 0x401}]}, 0x5c}}, 0x1) r4 = dup(0xffffffffffffffff) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="380000006c000100000000000000000000020000", @ANYRES32=r5, @ANYBLOB="000000000000000018003480140035"], 0x38}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000081}, 0x8000844) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:23 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB='0[?'], 0xc) 14:07:23 executing program 2: r0 = inotify_init1(0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 14:07:23 executing program 3: syz_mount_image$affs(&(0x7f0000000040)='affs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 14:07:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000e40)='keyring\x00', &(0x7f0000000e80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) [ 649.484007][T32439] affs: No valid root block on device loop3 [ 649.556525][T32439] affs: No valid root block on device loop3 14:07:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00c\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 649.766194][ T34] audit: type=1800 audit(1604239644.220:254): pid=32425 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16372 res=0 errno=0 14:07:24 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) 14:07:24 executing program 3: r0 = socket(0x23, 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x90}}, 0x24040000) 14:07:24 executing program 2: kexec_load(0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0xead}], 0x1) 14:07:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x80d1) 14:07:24 executing program 3: r0 = socket(0xa, 0x3, 0x7) connect$pptp(r0, 0x0, 0x0) 14:07:24 executing program 2: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) 14:07:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000000)={0xcd4, 0x3, 0x1, 'queue1\x00', 0x3}) 14:07:24 executing program 3: socket$inet_sctp(0x2, 0x7d79980c27bb35e4, 0x84) 14:07:24 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@get={0x1, &(0x7f0000000100)=""/90, 0x2}) 14:07:24 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000002c0)) 14:07:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000080)={0x10}, 0x10}, {&(0x7f0000001280)={0x10, 0x0, 0x200}, 0x10}, {&(0x7f0000001700)={0x28, 0x2a, 0x1, 0x0, 0x0, "", [@nested={0x15, 0x0, 0x0, 0x1, [@generic="5182ac72bba3858f133073ba781e352549"]}]}, 0x28}], 0x3}, 0x0) [ 650.346219][T32482] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 14:07:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00d\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:25 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000004f40), 0x4) 14:07:25 executing program 2: r0 = socket(0x29, 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, 0x0) [ 650.590455][ T34] audit: type=1800 audit(1604239645.050:255): pid=32457 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16383 res=0 errno=0 14:07:25 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f00000000c0)={0x3}) 14:07:25 executing program 3: creat(&(0x7f0000004e80)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/230, 0xe6}], 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) 14:07:25 executing program 2: select(0x40, &(0x7f0000000000)={0x5}, &(0x7f0000000040)={0x7}, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}) [ 650.772679][ T34] audit: type=1804 audit(1604239645.230:256): pid=32496 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir323333964/syzkaller.iPFvpJ/1487/file0" dev="sda1" ino=16369 res=1 errno=0 14:07:25 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000000)=@name, 0x10) [ 650.859645][ T34] audit: type=1804 audit(1604239645.230:257): pid=32496 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir323333964/syzkaller.iPFvpJ/1487/file0" dev="sda1" ino=16369 res=1 errno=0 [ 650.956138][ T34] audit: type=1804 audit(1604239645.240:258): pid=32496 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir323333964/syzkaller.iPFvpJ/1487/file0" dev="sda1" ino=16369 res=1 errno=0 14:07:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$IOCTL_VMCI_QUEUEPAIR_DETACH(r1, 0x7aa, &(0x7f0000000000)={{@local, 0x6}, 0x7fffffff, 0x6}) 14:07:25 executing program 2: syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') 14:07:25 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040)=0x6, 0x4) 14:07:25 executing program 2: r0 = socket(0x29, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@mark={{0x14}}, @mark={{0x14}}], 0x30}, 0x0) 14:07:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000003a40)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 14:07:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00e\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 651.578894][ T34] audit: type=1800 audit(1604239646.040:259): pid=32502 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16370 res=0 errno=0 14:07:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)={0x10, 0x3f, 0x21b0328db2be542f}, 0x10}, {&(0x7f00000013c0)=ANY=[], 0x18}], 0x2}, 0x0) 14:07:26 executing program 3: creat(&(0x7f0000000380)='./file1\x00', 0x0) open(&(0x7f0000000340)='./file1\x00', 0x8003, 0x0) [ 651.691039][ T34] audit: type=1804 audit(1604239646.150:260): pid=32531 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir323333964/syzkaller.iPFvpJ/1491/file1" dev="sda1" ino=16381 res=1 errno=0 14:07:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) 14:07:26 executing program 2: socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private2}]}, &(0x7f00000001c0)=0x10) 14:07:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001400)=[{0x0}, {&(0x7f00000013c0)=ANY=[], 0x18}], 0x2, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}], 0x20}, 0x0) 14:07:26 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000140)) 14:07:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000037c0), &(0x7f0000003800)=0x14) 14:07:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xfffffffffffffebd, "2222cc55abfa470599e06f385d7d98dbee4ea7dad03a526c2074ed3116de0fbcf07a7e6c341edd3c99627eb486e72b1f4270d81dd6634ac32708d70599516d2237705ca9be6ef2d497e60de850e8d322724b978603fe363df27a2e612fa1517adef40523905bcb989336b063ac6ff93c08307c5efff8efe8068cab6ab03ae96a9dbf52b741691f2d8b5f8660894c68ef7c205272cef89571ca5efad4d10230e6544a49abcbb6931c6bd863f6e68d8fb7862f4b9ff949275c4a4df659249d80d8d02d52679e9ef82cc6d6e2bd520864e2ac7f47c8d5101a3fd1875d8a42d93e390e16028a00"/242}, &(0x7f0000000100)=0xfffffffffffffef8) 14:07:26 executing program 0: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0x1) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000400)={0x3, &(0x7f0000000080)=[{0x5, 0x30, 0x1, 0x5}, {0x6, 0x6, 0x5, 0x4}, {0x1, 0x2, 0x9, 0x4}]}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x12a00, 0x0) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f00000001c0)) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RREADLINK(r4, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0x1) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$6lowpan_enable(r5, &(0x7f0000000000)='0', 0x1) ioctl$KVM_GET_NR_MMU_PAGES(r5, 0xae45, 0x200) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 14:07:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x10, &(0x7f0000000280)=[{0x0}, {&(0x7f00000000c0)="b6", 0x1}], 0x2}, 0x0) 14:07:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00f\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 652.358579][ T34] audit: type=1800 audit(1604239646.810:261): pid=32537 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:07:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8) getpid() sendmsg$netlink(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)={0xeac, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x55, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@mcast1}, @generic="887e274644ef43b0960438aef3e2a935f5", @typed={0x8, 0x0, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0x6, 0x0, 0x0, 0x0, @str=',\x00'}, @typed={0x4}, @typed={0x17, 0x0, 0x0, 0x0, @str='/}%-)[!^!\\w\\}.%+}:\x00'}]}, @nested={0x229, 0x0, 0x0, 0x1, [@typed={0x4}, @generic="1ddb8e5ef9e941d048f0a257fca0a987a9f52d1e84ba0c62ac1afb42b4740340cb5f36f368967fdb35a046c5d86bf17dc3535c7e3b4f8a65248b2fa7015fe43598bee11e92fa987f23d16b4bc6f04c72214a96c4895fb5f7bc8bb1b303c5570ae20b59fe981070eeab6ddefbcd", @generic="a9fdece708659b601ae31a12c3736b67da0537dc0074784487e058811dc4ec6a84a0112e2f29519de39647b32ca1b1b179f8325606dc31ae2e8f2a097af01af2d60a038ab205c36e90428918d794ac59f1bfdf4dad44c68a4b1e3b9e0117c4a34f8d20d9a10c5deb25a04e88963ec3c5083e7027e852ceea2421b487360b880eb9de6dd3c21f5e71d84ebabb16028b7081ec15c02fc13aedfa2b438e0f0bc7291bb8968b94941611b047044b40589a567fd93724cc927a26a327c618454e36515bd139302d4e2a59eb904c28e8e9114ad020b7889fdcaf7619eced86a86ebfe55ca53a5e8514", @typed={0x8, 0x0, 0x0, 0x0, @u32}, @generic="239f39780c08aa7557959406a56306847f05adb771fe66c385f59a292a2d3473a328bfc8176f028ec92222f9add9c0eab4b238eb0f6930346778e3131fcfc74692c2c1420f5437c18f31eeba2d56d56ff8bea1b0f70fb8f76c5b3ab920c9df08f235c575187f234034791b0006a66ef4a169a70c6216c7a699b317e4eef884e6f3cd4ac3416d8110d66bf044363cb34cd826183c071811d9b7e73fcdebf0ea3755ae3245a614d94431f8c0bd119300f14fe5779b36323ee4ba3db95b8824b47950798dddda33"]}, @nested={0xc15, 0x0, 0x0, 0x1, [@typed={0x4}, @typed={0x59, 0x0, 0x0, 0x0, @binary="4897dbddc0ea033448c6e46b17afef3114878c0804ad0503836ba985aec0219d3c26e004d743fc120bd771caa7eb29def07082700bcd7ca212105bbeb45ad535d2875d5886f98d948861a246ca192487db00245a35"}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@empty}, @generic="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"]}]}, 0xeac}, {0x0, 0x18}], 0x2}, 0x0) 14:07:27 executing program 3: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffffffffffff, 0x0) 14:07:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}], 0x20}, 0x0) 14:07:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0xc) 14:07:27 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000500)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, 0x0) 14:07:27 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0xc00000a2, 0x0) 14:07:27 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0x0, 0x7}}, 0x10) 14:07:27 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000280)='logon\x00', 0x0, 0x0, 0x0, r0) 14:07:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getpid() sendmsg$netlink(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)={0x14, 0x3f, 0x21b0328db2be542f, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) 14:07:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:27 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1, 0x0, &(0x7f0000000080)) [ 653.290689][ T34] audit: type=1800 audit(1604239647.750:262): pid=32576 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:07:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00g\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:27 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x165802) 14:07:27 executing program 2: r0 = socket(0xa, 0x5, 0x0) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x74}}, 0x4800) 14:07:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) recvfrom$rxrpc(r0, 0x0, 0x0, 0x2de6e763a2c16fe1, 0x0, 0x0) 14:07:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x8) 14:07:28 executing program 2: r0 = creat(&(0x7f0000004e80)='./file0\x00', 0x0) inotify_rm_watch(r0, 0x0) 14:07:28 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10}, 0x10}}, 0x0) 14:07:28 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x20}, 0x0) 14:07:28 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000004c0)='ns/user\x00') 14:07:28 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000001c0)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "8de29f4b"}}) [ 654.100364][ T34] audit: type=1800 audit(1604239648.560:263): pid=32621 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:07:28 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8200, 0x0) openat$cgroup_type(r1, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x800, @mcast2}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:07:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x30) 14:07:28 executing program 2: r0 = socket(0x1, 0x1, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}}, 0xc041) 14:07:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00h\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:28 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000100)='connect aa:aa:aa:aa:aa:11 2', 0x79) 14:07:28 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 14:07:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000e40)='keyring\x00', &(0x7f0000000e80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, 0x0, 0x0) 14:07:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, &(0x7f00000004c0)=0x100) 14:07:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 14:07:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, &(0x7f00000004c0)=0x100) 14:07:29 executing program 2: r0 = socket(0x2, 0x3, 0x8) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x1) 14:07:29 executing program 3: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 654.955109][ T34] audit: type=1800 audit(1604239649.410:264): pid=32651 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16383 res=0 errno=0 14:07:29 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000000280)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e20, @multicast1}}, 0x24) 14:07:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmmsg(r0, &(0x7f0000001100), 0x1, 0x0, 0x0) 14:07:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) 14:07:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00i\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:29 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x280000000000}, 0x0, 0x0) 14:07:29 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, 0x0, &(0x7f0000000280)) 14:07:29 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@generic) 14:07:29 executing program 3: 14:07:29 executing program 2: 14:07:29 executing program 0: 14:07:29 executing program 3: 14:07:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000500)={&(0x7f0000000040), 0xc, &(0x7f00000004c0)={0x0, 0x3e0}}, 0x0) 14:07:29 executing program 0: 14:07:29 executing program 3: 14:07:29 executing program 2: 14:07:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00j\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:30 executing program 0: 14:07:30 executing program 3: 14:07:30 executing program 2: [ 655.882405][ T34] audit: type=1800 audit(1604239650.340:265): pid=32690 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:07:30 executing program 3: 14:07:30 executing program 0: 14:07:30 executing program 2: 14:07:30 executing program 0: 14:07:30 executing program 3: 14:07:30 executing program 2: 14:07:30 executing program 3: 14:07:30 executing program 2: 14:07:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00k\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 656.619643][ T34] audit: type=1800 audit(1604239651.080:266): pid=32720 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16369 res=0 errno=0 14:07:31 executing program 0: 14:07:31 executing program 3: 14:07:31 executing program 2: 14:07:31 executing program 0: 14:07:31 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2, 0x0) flock(r0, 0x8) 14:07:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000b40)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @link_local, 'bond0\x00'}}, 0x80, 0x0}, 0x0) 14:07:31 executing program 0: 14:07:31 executing program 2: 14:07:31 executing program 3: 14:07:31 executing program 2: 14:07:31 executing program 0: 14:07:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00l\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 657.420428][ T34] audit: type=1800 audit(1604239651.880:267): pid=32740 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16374 res=0 errno=0 14:07:31 executing program 3: 14:07:31 executing program 2: 14:07:31 executing program 0: 14:07:32 executing program 3: 14:07:32 executing program 0: 14:07:32 executing program 2: 14:07:32 executing program 2: 14:07:32 executing program 3: 14:07:32 executing program 0: 14:07:32 executing program 2: 14:07:32 executing program 3: [ 658.141963][ T34] audit: type=1800 audit(1604239652.600:268): pid=300 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16375 res=0 errno=0 14:07:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00m\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:32 executing program 0: 14:07:32 executing program 2: 14:07:32 executing program 3: 14:07:32 executing program 0: 14:07:32 executing program 3: 14:07:32 executing program 2: 14:07:32 executing program 0: 14:07:32 executing program 2: 14:07:32 executing program 3: 14:07:33 executing program 0: 14:07:33 executing program 3: 14:07:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00n\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:33 executing program 2: 14:07:33 executing program 0: 14:07:33 executing program 3: [ 658.845823][ T34] audit: type=1800 audit(1604239653.300:269): pid=318 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:07:33 executing program 2: 14:07:33 executing program 0: 14:07:33 executing program 3: 14:07:33 executing program 0: 14:07:33 executing program 2: 14:07:33 executing program 3: 14:07:33 executing program 2: 14:07:33 executing program 0: 14:07:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00o\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:34 executing program 3: 14:07:34 executing program 2: 14:07:34 executing program 0: [ 659.671907][ T34] audit: type=1800 audit(1604239654.130:270): pid=342 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:07:34 executing program 0: 14:07:34 executing program 3: 14:07:34 executing program 2: 14:07:34 executing program 2: 14:07:34 executing program 3: 14:07:34 executing program 0: 14:07:34 executing program 3: 14:07:34 executing program 0: 14:07:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00p\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:35 executing program 2: [ 660.546986][ T34] audit: type=1800 audit(1604239655.000:271): pid=367 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16369 res=0 errno=0 14:07:35 executing program 3: 14:07:35 executing program 0: 14:07:35 executing program 3: 14:07:35 executing program 0: 14:07:35 executing program 2: 14:07:35 executing program 3: 14:07:35 executing program 2: 14:07:35 executing program 0: 14:07:35 executing program 2: 14:07:35 executing program 3: 14:07:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00q\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:35 executing program 0: 14:07:35 executing program 2: 14:07:35 executing program 3: [ 661.318557][ T34] audit: type=1800 audit(1604239655.770:272): pid=383 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16369 res=0 errno=0 14:07:35 executing program 3: 14:07:35 executing program 0: 14:07:35 executing program 2: 14:07:35 executing program 0: 14:07:35 executing program 3: 14:07:36 executing program 2: 14:07:36 executing program 3: 14:07:36 executing program 0: 14:07:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00r\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:36 executing program 2: 14:07:36 executing program 0: 14:07:36 executing program 3: [ 662.161258][ T34] audit: type=1800 audit(1604239656.620:273): pid=419 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16372 res=0 errno=0 14:07:36 executing program 3: 14:07:36 executing program 0: 14:07:36 executing program 2: 14:07:36 executing program 0: 14:07:36 executing program 3: 14:07:36 executing program 2: 14:07:36 executing program 0: 14:07:36 executing program 3: 14:07:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00s\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:37 executing program 2: 14:07:37 executing program 0: 14:07:37 executing program 3: [ 663.000253][ T34] audit: type=1800 audit(1604239657.460:274): pid=430 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16383 res=0 errno=0 14:07:37 executing program 3: 14:07:37 executing program 0: 14:07:37 executing program 2: 14:07:37 executing program 2: 14:07:37 executing program 0: 14:07:37 executing program 3: 14:07:37 executing program 2: 14:07:37 executing program 0: 14:07:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 663.777148][ T34] audit: type=1800 audit(1604239658.230:275): pid=464 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16370 res=0 errno=0 14:07:38 executing program 3: 14:07:38 executing program 2: 14:07:38 executing program 0: 14:07:38 executing program 0: 14:07:38 executing program 2: 14:07:38 executing program 3: 14:07:38 executing program 2: 14:07:38 executing program 0: 14:07:38 executing program 3: 14:07:38 executing program 2: 14:07:38 executing program 0: 14:07:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00u\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 664.637966][ T34] audit: type=1800 audit(1604239659.090:276): pid=474 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16374 res=0 errno=0 14:07:39 executing program 3: 14:07:39 executing program 2: 14:07:39 executing program 0: 14:07:39 executing program 2: 14:07:39 executing program 0: 14:07:39 executing program 3: 14:07:39 executing program 3: 14:07:39 executing program 2: 14:07:39 executing program 0: 14:07:39 executing program 3: 14:07:39 executing program 2: 14:07:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00v\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:40 executing program 0: 14:07:40 executing program 3: 14:07:40 executing program 2: [ 665.510561][ T34] audit: type=1800 audit(1604239659.970:277): pid=499 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:07:40 executing program 0: 14:07:40 executing program 2: 14:07:40 executing program 3: 14:07:40 executing program 2: 14:07:40 executing program 3: 14:07:40 executing program 0: 14:07:40 executing program 2: 14:07:40 executing program 3: 14:07:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00w\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:40 executing program 0: 14:07:40 executing program 2: 14:07:40 executing program 3: [ 666.321134][ T34] audit: type=1800 audit(1604239660.780:278): pid=519 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15926 res=0 errno=0 14:07:40 executing program 2: 14:07:40 executing program 3: 14:07:40 executing program 0: 14:07:40 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) sendmsg$sock(r2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8001) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x8001) bpf$LINK_DETACH(0x22, &(0x7f0000000100)=r3, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000180)='rose0\x00'}, 0x30) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000380)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000440)=""/5, 0x5}, 0x40010222) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xb4d6}, [@generic={0x7, 0x9, 0x4, 0x2, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @alu={0x7, 0x1, 0x1, 0x0, 0x0, 0x2, 0xffffffffffffffe6}]}, &(0x7f0000000280)='syzkaller\x00', 0x3, 0xb3, &(0x7f00000002c0)=""/179, 0x41000, 0x0, [], r4, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0xb, 0x3ff, 0xcc}, 0x10}, 0x78) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f00000000c0)) 14:07:41 executing program 0: 14:07:41 executing program 3: 14:07:41 executing program 0: 14:07:41 executing program 3: [ 667.131521][ T34] audit: type=1800 audit(1604239661.590:279): pid=541 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15970 res=0 errno=0 14:07:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00x\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:41 executing program 0: 14:07:41 executing program 3: 14:07:41 executing program 3: 14:07:41 executing program 0: 14:07:41 executing program 3: 14:07:41 executing program 0: 14:07:41 executing program 2: 14:07:41 executing program 3: setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, 0x0, 0x0) 14:07:41 executing program 0: io_setup(0x7fff, &(0x7f0000000240)) fsopen(0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x200100, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x200100, 0x0) io_submit(0x0, 0x0, 0x0) 14:07:42 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cachefiles\x00', 0x24000, 0x0) 14:07:42 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) accept$packet(r0, 0x0, 0x0) 14:07:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00y\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:42 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000600)='/dev/btrfs-control\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0x0, 0x0, 0xffffffffffffffff) 14:07:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 14:07:42 executing program 0: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/snd/timer\x00', 0x0) [ 667.951773][ T34] audit: type=1800 audit(1604239662.410:280): pid=566 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15827 res=0 errno=0 14:07:42 executing program 0: recvmsg$can_bcm(0xffffffffffffffff, 0x0, 0x80012162) 14:07:42 executing program 2: keyctl$join(0x1, &(0x7f0000001880)={'syz', 0x1}) 14:07:42 executing program 3: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001780)='/dev/cachefiles\x00', 0x313000, 0x0) 14:07:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f000000d5c0)={'ip6gre0\x00', @ifru_addrs=@xdp}) 14:07:42 executing program 3: io_setup(0x0, &(0x7f0000002540)) 14:07:42 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x341001, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000180)) 14:07:42 executing program 0: fsopen(&(0x7f0000000000)='pstore\x00', 0x0) 14:07:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0xb, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:07:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00z\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:43 executing program 2: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ocfs2_control\x00', 0x10000, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) 14:07:43 executing program 0: socketpair(0x1e, 0x0, 0x9589, &(0x7f0000000000)) 14:07:43 executing program 3: io_setup(0x4043, &(0x7f0000000000)) [ 668.696447][ T34] audit: type=1800 audit(1604239663.150:281): pid=596 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16034 res=0 errno=0 14:07:43 executing program 0: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000800)) 14:07:43 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 14:07:43 executing program 0: io_setup(0x7fff, &(0x7f0000000240)=0x0) io_submit(r0, 0x0, 0x0) 14:07:43 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(0xffffffffffffffff, 0xc0045405, 0x0) fsopen(&(0x7f0000000900)='selinuxfs\x00', 0x0) 14:07:43 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)) 14:07:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000b40)={'syztnl2\x00', 0x0}) 14:07:43 executing program 0: io_setup(0x7fff, &(0x7f0000000240)=0x0) io_submit(r0, 0x0, 0x0) 14:07:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 14:07:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00{\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:44 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) [ 669.560188][ T34] audit: type=1800 audit(1604239664.020:282): pid=636 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16179 res=0 errno=0 14:07:44 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001c40)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000001c80)=0x1) 14:07:44 executing program 3: io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x77359400}) 14:07:44 executing program 3: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0), 0x8}) 14:07:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000003580)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) 14:07:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x20000000}) 14:07:44 executing program 0: syz_genetlink_get_family_id$devlink(0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/cachefiles\x00', 0x200100, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, 0x0, 0x0) 14:07:44 executing program 3: syz_open_dev$audion(&(0x7f0000000500)='/dev/audio#\x00', 0x0, 0x202c1) 14:07:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xf, 0xffffffffffffffff, 0x7) 14:07:44 executing program 3: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000080)={0x9}, 0x0) 14:07:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) 14:07:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00|\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 670.378938][ T34] audit: type=1800 audit(1604239664.840:283): pid=670 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16210 res=0 errno=0 14:07:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000380)) 14:07:44 executing program 3: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ocfs2_control\x00', 0x0, 0x0) 14:07:44 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10040, 0x0) 14:07:44 executing program 0: clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)={0x2000000000}, &(0x7f0000000400)={0x0, r0+60000000}, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) 14:07:45 executing program 2: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, 0x0, 0x0) io_setup(0x7fff, &(0x7f0000000240)) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x200100, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:07:45 executing program 3: openat$nullb(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/nullb0\x00', 0x6780, 0x0) 14:07:45 executing program 0: pselect6(0x40, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000000400), 0x0) 14:07:45 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x7) 14:07:45 executing program 2: syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') 14:07:45 executing program 3: syz_genetlink_get_family_id$devlink(&(0x7f0000000700)='devlink\x00') r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/snd/timer\x00', 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000c00)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x14}, 0x14}}, 0x0) 14:07:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) 14:07:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00}\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 671.150724][ T34] audit: type=1800 audit(1604239665.610:284): pid=727 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:07:45 executing program 3: pipe2$9p(&(0x7f0000000140), 0x0) 14:07:45 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) 14:07:45 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 14:07:45 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x40000, 0x0) 14:07:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 14:07:45 executing program 3: select(0x0, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x6}, &(0x7f0000000500)={0x77359400}) 14:07:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 14:07:45 executing program 0: get_robust_list(0x0, 0x0, &(0x7f0000000a40)) 14:07:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000001540)) 14:07:46 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0xc0045405, &(0x7f0000000080)) 14:07:46 executing program 2: syz_io_uring_setup(0x7f02, &(0x7f0000000000)={0x0, 0xf33e, 0x8}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 672.010901][ T34] audit: type=1800 audit(1604239666.470:285): pid=741 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16290 res=0 errno=0 14:07:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00~\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:46 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x50000, 0x0) 14:07:46 executing program 2: syz_io_uring_setup(0x7f02, &(0x7f0000000000), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x2ec8, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x5000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 14:07:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000075980)) 14:07:46 executing program 2: syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x0) 14:07:46 executing program 3: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a5, 0x0) 14:07:46 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={[0x1ff]}, 0x8}) 14:07:46 executing program 2: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ocfs2_control\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 14:07:46 executing program 3: syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) 14:07:46 executing program 0: socketpair(0x0, 0xc, 0x0, &(0x7f00000002c0)) 14:07:46 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), 0x14) 14:07:47 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x441, 0x0) 14:07:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"007f00"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 672.850794][ T34] audit: type=1800 audit(1604239667.310:286): pid=786 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16290 res=0 errno=0 14:07:47 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) 14:07:47 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0xc0045405, &(0x7f0000000340)=0xe0) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:07:47 executing program 0: syz_io_uring_setup(0x7f02, &(0x7f0000000000)={0x0, 0xf33e}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0x2ec8, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x5000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 14:07:47 executing program 3: syz_io_uring_setup(0x7cf2, &(0x7f0000000180)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 14:07:47 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000600)='/dev/btrfs-control\x00', 0x20000, 0x0) 14:07:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000140)={&(0x7f0000000040), 0x8, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYRES32], 0x68}, 0x1, 0x0, 0x0, 0x400c011}, 0x4800c) 14:07:47 executing program 3: pselect6(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)={0x2000000000}, 0x0, &(0x7f0000000480)={&(0x7f0000000440), 0x8}) 14:07:47 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x791000, 0x0) 14:07:47 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4800, 0x0) 14:07:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NET_DM_CMD_STOP(r0, 0x0, 0x0) 14:07:47 executing program 2: getresuid(&(0x7f0000000140), 0x0, 0x0) [ 673.664046][ T34] audit: type=1800 audit(1604239668.120:287): pid=837 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:07:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"088000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:48 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000600)='/dev/btrfs-control\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000740)='\xad]\xd1-%,%\x00', &(0x7f0000000780)='./file0\x00', 0xffffffffffffffff) 14:07:48 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ocfs2_control\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 14:07:48 executing program 2: setfsuid(0xee01) openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x40000, 0x0) 14:07:48 executing program 2: 14:07:48 executing program 3: 14:07:48 executing program 0: 14:07:48 executing program 3: 14:07:48 executing program 2: 14:07:48 executing program 0: 14:07:48 executing program 3: 14:07:48 executing program 2: 14:07:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 674.563902][ T34] audit: type=1800 audit(1604239669.020:288): pid=877 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15767 res=0 errno=0 14:07:49 executing program 0: 14:07:49 executing program 3: 14:07:49 executing program 2: 14:07:49 executing program 2: 14:07:49 executing program 3: pselect6(0x40, &(0x7f0000000300), 0x0, &(0x7f0000000380), &(0x7f0000000400), 0x0) 14:07:49 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0xfffffffffffffffb}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x3]}, 0x8}) 14:07:49 executing program 2: 14:07:49 executing program 3: 14:07:49 executing program 0: 14:07:49 executing program 3: 14:07:49 executing program 2: 14:07:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 675.408794][ T34] audit: type=1800 audit(1604239669.860:289): pid=915 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16375 res=0 errno=0 14:07:49 executing program 0: 14:07:49 executing program 3: 14:07:49 executing program 2: 14:07:50 executing program 3: 14:07:50 executing program 2: 14:07:50 executing program 0: 14:07:50 executing program 2: 14:07:50 executing program 3: 14:07:50 executing program 0: 14:07:50 executing program 2: 14:07:50 executing program 0: [ 676.261939][ T34] audit: type=1800 audit(1604239670.720:290): pid=924 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16375 res=0 errno=0 14:07:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:50 executing program 3: 14:07:50 executing program 0: 14:07:50 executing program 2: 14:07:50 executing program 3: 14:07:50 executing program 2: 14:07:50 executing program 0: 14:07:50 executing program 3: 14:07:51 executing program 2: 14:07:51 executing program 0: 14:07:51 executing program 3: 14:07:51 executing program 2: 14:07:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 677.131540][ T34] audit: type=1800 audit(1604239671.590:291): pid=949 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16377 res=0 errno=0 14:07:51 executing program 3: 14:07:51 executing program 0: 14:07:51 executing program 2: 14:07:51 executing program 3: 14:07:51 executing program 2: 14:07:51 executing program 0: 14:07:51 executing program 3: 14:07:51 executing program 2: 14:07:51 executing program 2: 14:07:51 executing program 0: 14:07:51 executing program 3: 14:07:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 678.027198][ T34] audit: type=1800 audit(1604239672.480:292): pid=984 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:07:52 executing program 0: 14:07:52 executing program 2: 14:07:52 executing program 3: 14:07:52 executing program 2: 14:07:52 executing program 3: 14:07:52 executing program 0: 14:07:52 executing program 3: 14:07:53 executing program 0: 14:07:53 executing program 2: 14:07:53 executing program 3: 14:07:53 executing program 0: [ 678.704444][ T34] audit: type=1800 audit(1604239673.160:293): pid=990 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16375 res=0 errno=0 14:07:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:53 executing program 0: 14:07:53 executing program 3: 14:07:53 executing program 2: 14:07:53 executing program 0: 14:07:53 executing program 3: 14:07:53 executing program 2: 14:07:53 executing program 0: 14:07:53 executing program 3: 14:07:53 executing program 0: 14:07:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="4c00000024001b070000000100000000000000000600040000000000060003000000000006000400000000000600030000000000060003000023"], 0x4c}}, 0x0) 14:07:53 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x763ae2fdeb7de187) [ 679.129624][ T1026] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 14:07:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:54 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001340)=@delsa={0x28, 0x11, 0x1, 0x0, 0x0, {@in=@remote, 0x0, 0x0, 0x32}}, 0x28}}, 0x0) 14:07:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x9}, 0x40) [ 679.601069][ T34] audit: type=1800 audit(1604239674.060:294): pid=1020 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16381 res=0 errno=0 14:07:54 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101, 0x0) write$rfkill(r0, &(0x7f0000000100)={0x0, 0x0, 0x2}, 0x8) 14:07:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0x3c, 0x0, &(0x7f0000000000)) 14:07:54 executing program 0: 14:07:54 executing program 2: 14:07:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, r1, 0x1}, 0x39}}, 0x0) recvmmsg(r0, &(0x7f0000004f40)=[{{&(0x7f0000002840)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) 14:07:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x240, 0x2, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_ZONE={0x6}, @CTA_TUPLE_REPLY={0xbc, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv6={{0x0, 0x3, @loopback}, {0x0, 0x4, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @dev}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @private2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_PROTOINFO={0x1c, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x18, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc}]}}, @CTA_ZONE={0x6}, @CTA_TUPLE_ORIG={0x90, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @private1}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @dev}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x1}}]}, @CTA_TUPLE_MASTER={0x64, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @dev}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_PROTOINFO={0x50, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x4c, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5}, @CTA_PROTOINFO_SCTP_STATE={0x5}, @CTA_PROTOINFO_SCTP_STATE={0x5}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8}, @CTA_PROTOINFO_SCTP_STATE={0x5}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8}]}}]}, 0x240}}, 0x0) [ 679.914671][ T1054] netlink: 'syz-executor.3': attribute type 3 has an invalid length. 14:07:54 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x202) write$FUSE_ATTR(r0, 0x0, 0x0) 14:07:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 680.458477][ T34] audit: type=1800 audit(1604239674.910:295): pid=1068 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:07:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x8}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000400)=""/205, 0x39, 0xcd, 0x1}, 0x20) 14:07:54 executing program 3: sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000001a00)='devlink\x00') 14:07:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') 14:07:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000100)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in=@broadcast}, {@in=@loopback}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, [@coaddr={0x12, 0xe, @in6=@private2}]}, 0x104}}, 0x0) 14:07:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000008300)={0x0, 0x0, &(0x7f00000082c0)={&(0x7f0000002900)=@delchain={0x24, 0x65, 0xd34a35dd0280534b}, 0x24}}, 0x0) 14:07:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:55 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000100)=@updsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in=@broadcast}, {@in=@loopback}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, [@coaddr={0x12, 0xe, @in6=@private2}]}, 0x104}}, 0x0) 14:07:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/247, 0x26, 0xf7, 0x1}, 0x20) 14:07:55 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x1, 0x80082) write$cgroup_int(r0, 0x0, 0x0) 14:07:55 executing program 0: syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 14:07:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008900"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 681.183332][ T34] audit: type=1800 audit(1604239675.640:296): pid=1080 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16369 res=0 errno=0 14:07:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) 14:07:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20007d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef020001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2e200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000008082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}], 0x0, &(0x7f0000000340)={[{@usrjquota='usrjquota='}, {@jqfmt_vfsv1='jqfmt=vfsv1'}]}) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000180)) syz_genetlink_get_family_id$net_dm(0x0) 14:07:55 executing program 3: r0 = socket(0xa, 0x3, 0x84) getsockname$packet(r0, 0x0, &(0x7f0000000240)) 14:07:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:07:55 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000100)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}, {@in=@loopback}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 14:07:55 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x202) pwritev2(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="e9", 0x1}], 0x1, 0xbe0, 0x0, 0x0) 14:07:55 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x4c, 0x12, 0x301, 0x20000000, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0xfffffffa}}, 0x4c}}, 0x0) pipe2(&(0x7f00000009c0), 0x0) 14:07:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x0, 0x0, 0x0, 0x1702}, 0x40) 14:07:56 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x4c, 0x12, 0x301, 0x20000000, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0xfffffffa}}, 0x4c}}, 0x0) pipe2(&(0x7f00000009c0), 0x0) 14:07:56 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x12, 0x301, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4a}]}, 0x50}}, 0x0) 14:07:56 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x4c, 0x12, 0x301, 0x20000000, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0xfffffffa}}, 0x4c}}, 0x0) pipe2(&(0x7f00000009c0), 0x0) [ 682.074579][ T34] audit: type=1800 audit(1604239676.530:297): pid=1117 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16370 res=0 errno=0 14:07:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008a00"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:56 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x41601) write$FUSE_DIRENTPLUS(r0, 0x0, 0xb8) 14:07:56 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x4c, 0x12, 0x301, 0x20000000, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0xfffffffa}}, 0x4c}}, 0x0) pipe2(&(0x7f00000009c0), 0x0) 14:07:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) 14:07:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0x6, 0x0, &(0x7f0000000300)) 14:07:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@fwd={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000140)=""/129, 0x2a, 0x81, 0x1}, 0x20) 14:07:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000840)={0x188, 0x2, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_ZONE={0x6}, @CTA_TUPLE_REPLY={0xa4, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @dev}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_PROTOINFO={0x1c, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0x18, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5}, @CTA_PROTOINFO_DCCP_HANDSHAKE_SEQ={0xc}]}}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}, @CTA_TUPLE_ORIG={0x0, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv6={{0x0, 0x3, @local}, {0x0, 0x4, @private1}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv6={{0x0, 0x3, @empty}, {0x0, 0x4, @dev}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv4={{0x0, 0x1, @multicast2}}}, @CTA_TUPLE_ZONE, @CTA_TUPLE_PROTO]}, @CTA_TUPLE_MASTER={0x40, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @dev}}}, @CTA_TUPLE_IP={0x0, 0x1, 0x0, 0x1, @ipv6={{0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x0, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_PROTOINFO={0x50, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x4c, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5}, @CTA_PROTOINFO_SCTP_STATE, @CTA_PROTOINFO_SCTP_STATE={0x5}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8}, @CTA_PROTOINFO_SCTP_STATE={0x5}, @CTA_PROTOINFO_SCTP_VTAG_REPLY={0x8}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8}]}}]}, 0x1d9}}, 0x0) 14:07:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f00000002c0)=""/247, 0x26, 0x12a, 0x1}, 0x20) [ 682.391808][ T1155] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.3'. 14:07:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0xc, 0x0, &(0x7f0000000000)) 14:07:56 executing program 0: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000002180)) 14:07:57 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x4c, 0x12, 0x301, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0xfffffffa}}, 0x4c}}, 0x0) 14:07:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000), 0x4) [ 683.012202][ T34] audit: type=1800 audit(1604239677.470:298): pid=1173 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16369 res=0 errno=0 14:07:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008b00"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:57 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x4c, 0x12, 0x301, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, 0xfffffffa}}, 0x4c}}, 0x0) 14:07:57 executing program 3: syz_mount_image$udf(0x0, &(0x7f0000001bc0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:07:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) 14:07:57 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newtaction={0x3ec4, 0x30, 0x0, 0x0, 0x0, {}, [{0xec8, 0x1, [@m_gact={0xe8, 0x0, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc}, @TCA_GACT_PROB={0xc}]}, {0xa1, 0x6, "374ebe364a73d060ab74b5793b767e986d064071154d09a0fc9263f3778a85aa7de566bf7a5a7c4c23ab161f1d8e98971303faffdd9bf2f5cfd481db07e7aeef1977d5ee1cc702ce813b65c03844ca302898c41e371e02dbadc66106039e97411fe385053ddb94ba95105d0a9d14646a8b2d0f65620bc00f07b825e8954072fc2211fbf24d90d315e625d8b916672d1dda74609d7481e2b8c9df0079fa"}, {0xc}, {0xc}}}, @m_xt={0xddc, 0x0, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x4}, {0xdb1, 0x6, "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"}, {0xc}, {0xc}}}]}, {0x4}, {0x2ed8, 0x1, [@m_pedit={0x2ed4, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x2dd0, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe38, 0x2, {{{}, 0x0, 0x0, [{}]}}}, @TCA_PEDIT_KEYS_EX={0x48, 0x5, 0x0, 0x1, [{0x44, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_KEYS_EX={0x4}, @TCA_PEDIT_KEYS_EX={0x28, 0x5, 0x0, 0x1, [{0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xef8, 0x4, {{{}, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}}}, @TCA_PEDIT_KEYS_EX={0x80, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_KEYS_EX={0x158, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x4}, {0x44, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x4c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}, @TCA_PEDIT_PARMS_EX={0xe50, 0x4, {{{}, 0x0, 0x0, [{}, {}]}}}]}, {0xd9, 0x6, "76fde8dea585c980070c3a64ac7f83c92a5281056829cafd2c8da6b1e25863194189c85a78c27c18aec96c4110487c0b9583ce6abd1ba5315e3159e972e429693eeb6903ff9d96e2e5b297023759075254f28f3938213ff3ac077c8711fbe0e7f691e7209ead924fab421684d8396d815c119dd438062cd736a8861fe0f8061f631f147ec0f2372bef4df20bc9ec0ff22532d9771e41656f6b7b5acd962bde0daeab50d0bcb69158326c80642492aca2a31074a05c8f75de53136c2d589a0621db93084f75cb7bdeda11ca4333777741564c72eb31"}, {0xc}, {0xc}}}]}, {0x10c, 0x1, [@m_ipt={0xbc, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8}]}, {0x81, 0x6, "e42ddec3ffde0cea7acfc39721f6bf0e221bc676681b3076debd7c4bb23b6f614f8dc601f855622c207f63914f137930d5c6cbf9fb1dcc586c35c6107f1d72b9543ce12298fdc7d3a56f829353d07c4b095e9db25c7bafecbc47443eb6f66f6e733012e6859a91318381a7741176f542ac4f1753d509c57ddd110fb77d"}, {0xc}, {0xc}}}, @m_simple={0x4c, 0x0, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x4}, {0x1d, 0x6, "fee6c7fe3cdd08d6659deeabd8dab479289fc94c5d8b0005cc"}, {0xc}, {0xc}}}]}]}, 0x3ec4}}, 0x0) 14:07:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0x26, 0x0, &(0x7f0000000080)) 14:07:57 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x400, 0x42) write$FUSE_ATTR(r0, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00}}}, 0x78) 14:07:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:07:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0x25, 0x0, &(0x7f0000000440)) 14:07:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3002, 0x0) 14:07:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_STATFS(r0, 0x0, 0x0) 14:07:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x5b}}, 0x0) [ 683.900161][ T34] audit: type=1800 audit(1604239678.360:299): pid=1186 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16375 res=0 errno=0 14:07:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008c00"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000001540)=@delpolicy={0x58, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, [@XFRMA_IF_ID={0x8}]}, 0x58}}, 0x0) 14:07:58 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x2, 0x3, 0x201}, 0x14}}, 0x0) 14:07:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) 14:07:58 executing program 0: msgrcv(0x0, 0x0, 0x0, 0x2, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x3}, 0x8, 0x0) 14:07:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:58 executing program 3: syz_emit_ethernet(0xd5, &(0x7f00000013c0)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @multicast1, {[@generic={0x0, 0x42, "b4430b2923d09e14ce"}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x8}, {"dd962b2bb54a81b05e006504621d49df6d3f0afd20c618a2b260d53de8df6d24c213f9836784d221b75464c2805ed33f2f554876684736b095b89091196bf21fab3a295dc77f61ed743f24fc3b1aa26e1c5cc5f6e39c0ae35769c3c854eae4f7e7f5c4855863bdd50cb8d6fa0f43ec0f3c9e3986b68e9f62476d3b9c59faeaa2b26f5b17dd0ac9ac1a081e03828425817776d6fab29cce07d374893b707a0ca7471fd54a89233a65"}}}}}}, 0x0) 14:07:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:58 executing program 3: syz_emit_ethernet(0xd5, &(0x7f00000013c0)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @multicast1, {[@generic={0x0, 0x42, "b4430b2923d09e14ce"}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x8}, {"dd962b2bb54a81b05e006504621d49df6d3f0afd20c618a2b260d53de8df6d24c213f9836784d221b75464c2805ed33f2f554876684736b095b89091196bf21fab3a295dc77f61ed743f24fc3b1aa26e1c5cc5f6e39c0ae35769c3c854eae4f7e7f5c4855863bdd50cb8d6fa0f43ec0f3c9e3986b68e9f62476d3b9c59faeaa2b26f5b17dd0ac9ac1a081e03828425817776d6fab29cce07d374893b707a0ca7471fd54a89233a65"}}}}}}, 0x0) 14:07:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x13f8, 0x11, 0x0, 0x27) 14:07:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008d00"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:07:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 684.734495][ T34] audit: type=1800 audit(1604239679.190:300): pid=1243 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16369 res=0 errno=0 14:07:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x13f8, 0x11, 0x0, 0x27) 14:07:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='highspeed\x00', 0xa) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x13f8, 0x11, 0x0, 0x27) 14:07:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43}, {&(0x7f0000000140)=""/224}]}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82}, {&(0x7f0000000300)=""/8}, {&(0x7f0000000340)=""/35}, {&(0x7f0000000380)=""/74}, {&(0x7f0000002780)=""/4096}, {&(0x7f0000000400)=""/87}, {&(0x7f0000000480)=""/141}, {&(0x7f0000000540)=""/167}], 0x0, &(0x7f0000000680)=""/116}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7}, {&(0x7f0000000740)=""/127}, {&(0x7f00000007c0)=""/160}, {&(0x7f0000000880)=""/240}, {&(0x7f0000003780)=""/4096}, {&(0x7f0000000980)=""/74}, {&(0x7f0000000a00)=""/225}, {&(0x7f0000000b00)=""/231}, {&(0x7f0000000c00)=""/128}, {&(0x7f0000000c80)=""/37}], 0x0, &(0x7f0000004780)=""/4096}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67}, {&(0x7f0000000e80)=""/1}, {&(0x7f0000000ec0)=""/169}, {&(0x7f0000000f80)=""/107}, {&(0x7f0000001100)=""/248}], 0x0, &(0x7f0000005780)=""/4096}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @private0}}, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41}, {&(0x7f0000001280)=""/47}, {&(0x7f00000012c0)=""/190}, {&(0x7f0000001380)=""/241}, {&(0x7f0000001480)=""/124}], 0x0, &(0x7f0000006780)=""/246}}, {{&(0x7f0000001580)=@in, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199}], 0x0, &(0x7f00000069c0)=""/101}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248}]}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10a60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1981}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:07:59 executing program 3: shmat(0x0, &(0x7f0000ffa000/0x2000)=nil, 0x5000) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x3) 14:07:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:59 executing program 0: 14:07:59 executing program 3: 14:07:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:07:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008e00"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:00 executing program 0: 14:08:00 executing program 3: 14:08:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 685.620498][ T34] audit: type=1800 audit(1604239680.080:301): pid=1254 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:08:00 executing program 0: 14:08:00 executing program 3: 14:08:00 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000a80)={0xffffffffffffffff, 0x0}, 0x20) 14:08:00 executing program 3: 14:08:00 executing program 0: 14:08:00 executing program 3: 14:08:00 executing program 0: 14:08:00 executing program 3: 14:08:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"008f00"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:00 executing program 0: 14:08:00 executing program 3: [ 686.415517][ T34] audit: type=1800 audit(1604239680.870:302): pid=1292 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16370 res=0 errno=0 14:08:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:01 executing program 3: 14:08:01 executing program 0: 14:08:01 executing program 3: 14:08:01 executing program 0: 14:08:01 executing program 3: 14:08:01 executing program 0: 14:08:01 executing program 3: 14:08:01 executing program 0: [ 687.158293][ T34] audit: type=1800 audit(1604239681.610:303): pid=1327 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16381 res=0 errno=0 14:08:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"009000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:01 executing program 3: 14:08:01 executing program 0: 14:08:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:01 executing program 0: 14:08:01 executing program 3: 14:08:02 executing program 3: 14:08:02 executing program 0: 14:08:02 executing program 3: 14:08:02 executing program 0: 14:08:02 executing program 3: 14:08:02 executing program 0: 14:08:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"009100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 688.039874][ T34] audit: type=1800 audit(1604239682.500:304): pid=1334 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:08:02 executing program 3: 14:08:02 executing program 0: 14:08:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:02 executing program 3: 14:08:02 executing program 0: 14:08:02 executing program 3: setrlimit(0xe, &(0x7f00000000c0)={0x0, 0x8000}) 14:08:02 executing program 0: openat$full(0xffffff9c, &(0x7f0000000bc0)='/dev/full\x00', 0x400, 0x0) 14:08:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x0, 0x4, 0x0, 0x180}, 0x40) 14:08:03 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:08:03 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={0x0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 14:08:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:08:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"009200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:03 executing program 3: modify_ldt$write2(0x11, &(0x7f0000000480), 0x10) 14:08:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 688.938974][ T34] audit: type=1800 audit(1604239683.400:305): pid=1360 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16377 res=0 errno=0 14:08:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:03 executing program 0: openat$full(0xffffff9c, 0x0, 0x60000, 0x0) 14:08:03 executing program 3: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:08:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000041c0)={0x1, &(0x7f0000004180)=[{0x5}]}) 14:08:03 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) 14:08:03 executing program 3: 14:08:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) keyctl$restrict_keyring(0x1d, 0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000700)='NLBL_UNLBL\x00') openat$vsock(0xffffff9c, &(0x7f0000000980)='/dev/vsock\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000b40)) 14:08:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x8000}]}) 14:08:04 executing program 0: openat$autofs(0xffffff9c, &(0x7f0000000840)='/dev/autofs\x00', 0x6242, 0x0) [ 689.784285][ T34] audit: type=1800 audit(1604239684.240:306): pid=1395 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:08:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"009300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000041c0)={0x0, 0x0}) 14:08:04 executing program 0: setrlimit(0x0, &(0x7f0000001540)={0x6, 0xbc19}) 14:08:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, 0x0}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:08:04 executing program 3: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) 14:08:04 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40)='nl80211\x00') 14:08:04 executing program 3: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000700)='NLBL_UNLBL\x00') 14:08:04 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40)='nl80211\x00') 14:08:04 executing program 3: clock_gettime(0x4, &(0x7f0000004300)) 14:08:04 executing program 0: syz_mount_image$romfs(0x0, &(0x7f00000011c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)='security.evm\x00', 0x0, 0x0, 0x0) 14:08:04 executing program 0: r0 = gettid() sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x5) [ 690.644206][ T34] audit: type=1800 audit(1604239685.100:307): pid=1429 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:08:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"009400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000001500)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001280)={0x14}, 0x14}}, 0x0) 14:08:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:08:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:05 executing program 0: openat$full(0xffffff9c, &(0x7f00000023c0)='/dev/full\x00', 0x60000, 0x0) 14:08:05 executing program 3: syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') 14:08:05 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:08:05 executing program 3: sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000001240)='TIPCv2\x00') 14:08:05 executing program 0: 14:08:05 executing program 3: 14:08:05 executing program 0: 14:08:05 executing program 3: 14:08:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 691.544819][ T34] audit: type=1800 audit(1604239686.000:308): pid=1462 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16374 res=0 errno=0 14:08:06 executing program 0: 14:08:06 executing program 3: 14:08:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:06 executing program 0: 14:08:06 executing program 3: 14:08:06 executing program 0: 14:08:06 executing program 3: 14:08:06 executing program 0: 14:08:06 executing program 3: 14:08:06 executing program 0: 14:08:06 executing program 3: 14:08:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 692.464371][ T34] audit: type=1800 audit(1604239686.920:309): pid=1493 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16374 res=0 errno=0 14:08:06 executing program 0: 14:08:06 executing program 3: 14:08:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:07 executing program 3: 14:08:07 executing program 0: 14:08:07 executing program 3: 14:08:07 executing program 0: 14:08:07 executing program 3: 14:08:07 executing program 0: 14:08:07 executing program 3: 14:08:07 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, &(0x7f0000000000)={0x8, 'vlan0\x00', {'rose0\x00'}}) 14:08:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 693.338106][ T34] audit: type=1800 audit(1604239687.790:310): pid=1519 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:08:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@ipv6_getaddrlabel={0x30, 0x4a, 0x1, 0x0, 0x0, {0xa, 0x0, 0x80}, [@IFAL_ADDRESS={0x14, 0x1, @private0}]}, 0x30}}, 0x0) 14:08:07 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xb7) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x81) 14:08:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{0x0}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:08 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 14:08:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x31, 0x0, 0x0) 14:08:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x1, 0x1, 0x8777, 0x0, 0xffffffffffffffff, 0x0, [0x2]}, 0xe) 14:08:08 executing program 3: 14:08:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x32}}}, 0x1c) 14:08:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000580)={&(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}, 0x200000c0) sendmsg$inet6(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 14:08:08 executing program 0: r0 = socket(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @mcast2, 0x20}, 0x80) 14:08:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:08:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x660, 0x3d0, 0x3d0, 0x2d8, 0xd0, 0xd0, 0x590, 0x590, 0x590, 0x590, 0x590, 0x6, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @mcast1, [], [], 'netdevsim0\x00', 'bond0\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}, {{@ipv6={@mcast1, @loopback, [], [], 'bridge_slave_0\x00', 'syz_tun\x00'}, 0x0, 0x1e0, 0x208, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00', @local, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @private2, @private0, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, @empty, @mcast1, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, @remote]}}]}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@loopback}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6c0) 14:08:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x40000001, 0x0, 0x0) [ 694.255888][ T34] audit: type=1800 audit(1604239688.710:311): pid=1547 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 [ 694.348996][ T1578] x_tables: duplicate underflow at hook 1 14:08:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{0x0}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:09 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$unix(r0, &(0x7f0000003280)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x18, 0x1, 0x1, [r2, r1]}}], 0x18}], 0x1, 0x0) 14:08:09 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000040)={'lo\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) 14:08:09 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000000000), 0x1, 0x0) 14:08:09 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000200)) 14:08:09 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000000000), 0x1, 0x0) 14:08:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000002c40)={0x0, 0x0, 0x0}, 0x2000) 14:08:09 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000200)) 14:08:09 executing program 3: mount$fuse(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x29a82a, 0x0) [ 695.109352][ T34] audit: type=1800 audit(1604239689.570:312): pid=1583 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:08:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00e000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:09 executing program 0: getgroups(0x3fffffffffffffc4, &(0x7f0000000140)=[0xee00, 0x0, 0xee00, 0xee00, 0x0, 0xee00, 0xee00]) 14:08:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @nl=@unspec, @qipcrtr, @phonet}) 14:08:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{0x0}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000001c0)={@multicast2, @dev={0xac, 0x14, 0x14, 0x34}}, 0x8) 14:08:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 14:08:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@ipv6_newroute={0x30, 0x18, 0x101, 0x0, 0x0, {}, [@RTA_GATEWAY={0x14, 0x5, @local}]}, 0x30}}, 0x0) 14:08:10 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000000c0)=0x3) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)) 14:08:10 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 14:08:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x660, 0x3d0, 0xd0, 0x4c0, 0xd0, 0x4c0, 0x590, 0x590, 0x590, 0x590, 0x590, 0x6, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @mcast1, [], [], 'netdevsim0\x00', 'bond0\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@ipv6={@mcast1, @loopback, [], [], 'bridge_slave_0\x00', 'syz_tun\x00'}, 0x0, 0x1e0, 0x208, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00', @local, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, @private2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, @empty, @mcast1, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1, @remote]}}]}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@loopback}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6c0) [ 695.762694][ T1674] x_tables: duplicate underflow at hook 1 14:08:10 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000000c0)=0x3) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)) 14:08:10 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000000c0)=0x3) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000080)) [ 696.033949][ T34] audit: type=1800 audit(1604239690.490:313): pid=1636 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16374 res=0 errno=0 14:08:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00f000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:10 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) 14:08:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000000)={'lo\x00', @ifru_flags}) 14:08:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x12, 0x0, &(0x7f0000000040)) 14:08:10 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000200)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000040)=0x6c79) 14:08:10 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreq(r0, 0x0, 0x8, 0x0, &(0x7f0000000000)) 14:08:10 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:11 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:11 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:11 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) [ 696.916141][ T34] audit: type=1800 audit(1604239691.370:314): pid=1711 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15843 res=0 errno=0 14:08:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"0fff00"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0)={0x0, 0x2710}) 14:08:11 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:11 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@getqdisc={0x24, 0x26, 0x1}, 0x24}}, 0x0) 14:08:11 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f00000000c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfe}, 0x80) 14:08:11 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:11 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x0) 14:08:11 executing program 0: waitid(0x631916273a7a79b3, 0x0, 0x0, 0x8, 0x0) 14:08:12 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) [ 697.780226][ T34] audit: type=1800 audit(1604239692.240:315): pid=1754 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15796 res=0 errno=0 14:08:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:12 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000000)=@un=@abs, 0xa4, 0x0}}], 0x1, 0x0) 14:08:12 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect(r0, &(0x7f0000000040)=@in={0x2, 0x0, @empty}, 0x80) 14:08:12 executing program 3: socket$inet(0x2, 0xa, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_PRIORITY={0x8, 0x6, 0xff}]}, 0x24}}, 0x0) 14:08:12 executing program 3: socket$inet(0x2, 0xa, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:12 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000), 0x4) 14:08:12 executing program 3: socket$inet(0x2, 0xa, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006300)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, 0x0}}], 0x1, 0x0) 14:08:12 executing program 0: 14:08:12 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) [ 698.646535][ T34] audit: type=1800 audit(1604239693.100:316): pid=1803 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15843 res=0 errno=0 14:08:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00200100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:13 executing program 0: 14:08:13 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 14:08:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{0x0, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:13 executing program 0: 14:08:13 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 14:08:13 executing program 0: 14:08:13 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300), 0x0, 0x0) 14:08:13 executing program 0: 14:08:13 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300), 0x0, 0x0) 14:08:13 executing program 0: 14:08:13 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300), 0x0, 0x0) 14:08:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00300100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 699.453934][ T34] audit: type=1800 audit(1604239693.910:317): pid=1836 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15796 res=0 errno=0 14:08:13 executing program 0: 14:08:14 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:08:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{0x0, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:14 executing program 0: 14:08:14 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:08:14 executing program 0: 14:08:14 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 14:08:14 executing program 0: 14:08:14 executing program 3: 14:08:14 executing program 0: 14:08:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00400100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 700.214098][ T34] audit: type=1800 audit(1604239694.670:318): pid=1866 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16114 res=0 errno=0 14:08:14 executing program 3: 14:08:14 executing program 0: 14:08:14 executing program 0: 14:08:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{0x0, 0x0, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:15 executing program 3: 14:08:15 executing program 0: 14:08:15 executing program 3: 14:08:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local}}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@ssrr={0x89, 0xb, 0x4, [@multicast1, @dev]}, @noop]}}}], 0x40}, 0x8010) [ 700.850106][ T34] audit: type=1800 audit(1604239695.310:319): pid=1896 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16162 res=0 errno=0 14:08:15 executing program 0: 14:08:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00500100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:15 executing program 3: 14:08:15 executing program 0: 14:08:15 executing program 3: 14:08:15 executing program 0: 14:08:15 executing program 3: 14:08:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, 0x0, 0x0, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:16 executing program 0: 14:08:16 executing program 3: [ 701.589493][ T34] audit: type=1800 audit(1604239696.050:320): pid=1921 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16307 res=0 errno=0 14:08:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00600100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:16 executing program 3: 14:08:16 executing program 0: 14:08:16 executing program 3: 14:08:16 executing program 0: 14:08:16 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xcd34, 0x0) read$char_usb(r0, &(0x7f0000000040)=""/39, 0x27) 14:08:16 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) recvfrom$unix(r0, 0x0, 0x0, 0x40000041, 0x0, 0x0) rt_sigpending(&(0x7f00000001c0), 0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) r2 = syz_io_uring_complete(0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000440)={0x4}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, 0x0) syz_io_uring_setup(0x6640, &(0x7f0000000340)={0x0, 0x3991, 0x0, 0x2, 0x19e, 0x0, r1}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x890c, &(0x7f0000000240)={'ip6gre0\x00', 0x0}) 14:08:16 executing program 3: socket$unix(0x1, 0x2, 0x0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000040)={0x9}, &(0x7f0000000140)) 14:08:16 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800480, &(0x7f0000000180)) [ 702.414753][ T34] audit: type=1800 audit(1604239696.870:321): pid=1942 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16323 res=0 errno=0 14:08:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, 0x0, 0x0, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00700100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$xdp(r0, &(0x7f0000002400)={0x0, 0x0, &(0x7f0000002380)=[{0x0}, {&(0x7f0000000280)="8a", 0x1}, {&(0x7f0000000300)="c1", 0x1}], 0x3}, 0x0) 14:08:16 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/vcsa\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x11, 0x0, 0x0, 0x0}, 0x20) 14:08:17 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x80084504, &(0x7f0000000000)) 14:08:17 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x8}, 0x0, 0x0) 14:08:17 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 14:08:17 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f00000035c0), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 14:08:17 executing program 3: mlockall(0x3) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) 14:08:17 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x2002, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 14:08:17 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x8992, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) 14:08:17 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffed1) 14:08:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, 0x0, 0x0, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 703.327237][ T34] audit: type=1800 audit(1604239697.780:322): pid=1998 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16377 res=0 errno=0 14:08:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00800100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:17 executing program 0: syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x8200) 14:08:18 executing program 3: mlockall(0x3) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) 14:08:18 executing program 0: syz_mount_image$iso9660(&(0x7f0000000300)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='sbsector=0x']) 14:08:18 executing program 0: syz_mount_image$iso9660(&(0x7f0000000300)='iso9660\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='sbsector=0x']) 14:08:18 executing program 0: add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='\v', 0x1, 0xfffffffffffffffe) 14:08:18 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$xdp(r0, &(0x7f00000007c0)={0x0, 0x7ffef069, &(0x7f0000000780)=[{&(0x7f0000000600)='/', 0xff97}], 0x8, 0x0, 0x0, 0x4010}, 0x0) 14:08:18 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$xdp(r0, &(0x7f00000007c0)={0x0, 0x7ffef069, &(0x7f0000000780)=[{&(0x7f0000000600)='/', 0xff97}], 0x8, 0x0, 0x0, 0x4010}, 0x0) 14:08:18 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)) 14:08:18 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x53d902, 0x0) 14:08:18 executing program 3: mlockall(0x3) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) 14:08:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980), 0x0, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00900100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:18 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x40002060, 0x0, 0xfffffffffffffed1) [ 704.322976][ T34] audit: type=1800 audit(1604239698.780:323): pid=2012 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:08:18 executing program 0: socketpair(0x11, 0xa, 0x0, &(0x7f0000000080)) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000040)={0x9}, &(0x7f0000000140)) 14:08:19 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) recvfrom$unix(r0, 0x0, 0x14, 0x2, 0x0, 0xfffffffffffffed1) 14:08:19 executing program 0: 14:08:19 executing program 3: mlockall(0x3) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) 14:08:19 executing program 0: 14:08:19 executing program 0: 14:08:19 executing program 0: 14:08:19 executing program 0: 14:08:19 executing program 0: 14:08:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980), 0x0, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 705.292956][ T34] audit: type=1800 audit(1604239699.750:324): pid=2058 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:08:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a00100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:19 executing program 0: 14:08:19 executing program 3: mlockall(0x3) 14:08:19 executing program 0: 14:08:19 executing program 0: 14:08:20 executing program 0: 14:08:20 executing program 0: 14:08:20 executing program 0: 14:08:20 executing program 0: 14:08:20 executing program 3: mlockall(0x3) 14:08:20 executing program 0: 14:08:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980), 0x0, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 706.232331][ T34] audit: type=1800 audit(1604239700.690:325): pid=2102 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:08:20 executing program 0: 14:08:20 executing program 0: 14:08:20 executing program 0: 14:08:21 executing program 3: mlockall(0x0) 14:08:21 executing program 0: 14:08:21 executing program 3: mlockall(0x0) 14:08:21 executing program 0: ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) clock_gettime(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) add_key$keyring(0x0, &(0x7f0000000e00)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_GET_NAME(0x10, &(0x7f0000000e80)=""/76) 14:08:21 executing program 3: mlockall(0x0) 14:08:21 executing program 0: pipe(&(0x7f0000000100)) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, 0x0) 14:08:21 executing program 3: 14:08:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{0x0}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c00100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:21 executing program 0: 14:08:21 executing program 3: [ 707.142278][ T34] audit: type=1800 audit(1604239701.600:326): pid=2109 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:08:21 executing program 0: 14:08:21 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@mpol={'mpol', 0x3d, {'local'}}}]}) [ 707.316510][ T2142] tmpfs: Bad value for 'mpol' [ 707.332326][ T2142] tmpfs: Bad value for 'mpol' 14:08:21 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)) 14:08:21 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000780)={0x5, &(0x7f0000000740)=[{0x7, 0x0, 0x20, 0x401}, {}, {0xf4b}, {0x3ff, 0x3, 0x0, 0x3}, {0x8001, 0x4}]}) 14:08:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000000)) set_mempolicy(0x0, &(0x7f0000000040), 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(&(0x7f0000000100), &(0x7f0000000180), 0x0) r0 = creat(&(0x7f00000013c0)='./file0\x00', 0x0) ftruncate(r0, 0x7fffffff) timer_settime(0x0, 0x1, &(0x7f0000000480)={{}, {0x0, 0x989680}}, 0x0) 14:08:21 executing program 3: ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, &(0x7f0000000000)={0x24d, 0x0, [[], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], []]}) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:08:22 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x682841, 0x0) 14:08:22 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) clock_getres(0x0, 0x0) getuid() 14:08:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{0x0}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:22 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d00100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:22 executing program 0: pipe2$9p(0x0, 0x84800) 14:08:22 executing program 3: inotify_add_watch(0xffffffffffffffff, 0x0, 0x1000200) getegid() [ 708.038905][ T34] audit: type=1800 audit(1604239702.500:327): pid=2143 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16381 res=0 errno=0 14:08:22 executing program 0: prctl$PR_GET_NAME(0x10, &(0x7f0000000e80)=""/76) 14:08:22 executing program 3: pipe(&(0x7f0000000100)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self\x00', 0x101000, 0x0) 14:08:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000780)={0x0, 0x0}) 14:08:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000780)={0x2, &(0x7f0000000740)=[{0xf4b}, {0x6}]}) 14:08:22 executing program 0: pipe(0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self\x00', 0x0, 0x0) 14:08:22 executing program 3: add_key(&(0x7f0000014a40)='.dead\x00', &(0x7f0000014a80)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, 0x0, 0x0, 0xee01) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000014c00)={'ip6gre0\x00', 0x0}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000015000)={'ip6gre0\x00', 0x0}) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, 0x0) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) 14:08:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000000)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) r1 = dup(r0) ftruncate(r1, 0x400000000000000) statfs(&(0x7f0000000140)='./file0\x00', 0x0) timer_settime(0x0, 0x1, &(0x7f0000000480)={{}, {0x0, 0x989680}}, 0x0) 14:08:23 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) semctl$GETPID(0xffffffffffffffff, 0x0, 0xb, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000200), 0x0) 14:08:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{0x0}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00e00100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 708.878940][ T34] audit: type=1800 audit(1604239703.340:328): pid=2191 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:08:23 executing program 0: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000100)={0x89, 0x0, 0x1, 0x7fffffff, 0xd7c, 0x0, 0x0, 0x10000}, 0x0, 0x0, &(0x7f00000001c0)={r0, r1+10000000}, 0x0) syz_read_part_table(0x0, 0x53, &(0x7f0000000140)=[{&(0x7f0000000000)="901ee94a985649e49795a8085f6ae5d385eb51580a70439942007128535d13ded8727ca702bce79838d370801e6d8193c85c94d126058eb186e9785f94f1b5cdb9a14e4f340b19f6d15ae4a3c2575e6861ba38f416c591d8a370944f850f3d23ab33b2e67ac90747c1105696fb860de311d51f2b05eb57311ebc15817d958f12f69ef2a7c0895da14f7cd9d4fc5980df296568cb520e04ebab89aeb086ec402f5221baa0245e2ccea9a0b634668869d8091473c169a6214ee87caaa4d8668c0ee8e8a2526e48051b1cc3b078b856c3a0ae291d8691c4f89edaca1e0b35c0ab57fc57a3edc1e9fc7df98077148a3afc76032a04698a242c23b915f28dc7b4", 0xfe, 0x7}]) getpgid(0xffffffffffffffff) r2 = getpid() r3 = getpgid(r2) ptrace$peekuser(0x3, r3, 0x0) getpid() ptrace$peekuser(0x3, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0xfffffffffffffffd) inotify_init() ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) inotify_add_watch(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) getpgid(0x0) ptrace$peekuser(0x3, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) 14:08:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000400)) listxattr(&(0x7f0000000040)='\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 14:08:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000080)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) r1 = dup(r0) ftruncate(r1, 0x400000000000000) timer_settime(0x0, 0x1, &(0x7f0000000480)={{}, {0x0, 0x989680}}, 0x0) 14:08:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000100)='./file0\x00', 0x0) timer_create(0x0, 0x0, &(0x7f0000000000)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000013c0)='./file0\x00', 0x0) ftruncate(r0, 0x7fffffff) statfs(&(0x7f0000000140)='./file0\x00', 0x0) timer_settime(0x0, 0x1, &(0x7f0000000480)={{}, {0x0, 0x989680}}, 0x0) 14:08:23 executing program 0: syz_read_part_table(0x0, 0x53, &(0x7f0000000140)=[{&(0x7f0000000000)="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", 0xfe, 0x7}]) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 14:08:23 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) io_getevents(0x0, 0x2de, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}) clock_gettime(0x0, 0x0) clock_gettime(0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000600)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @usage=0xffff, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x5000000000000]}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @usage, 0x0, 0x0, [0x0, 0x0, 0x8]}, {0x0, @struct, 0x0, 0x0, 0x0, 0x5f97, 0xa874, 0x0, 0x400, @struct={0xfffffff7}, 0x0, 0x0, [0x0, 0x7]}, {0x3}}) add_key(&(0x7f0000000c00)='big_key\x00', 0x0, &(0x7f0000000c80), 0x0, 0xfffffffffffffffb) 14:08:23 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0xfffffffffffffffd) 14:08:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000003d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000005340)=""/225, 0xe1}, {0x0}], 0x2, &(0x7f0000000500)=""/161, 0xa1}}], 0x1, 0x0, &(0x7f0000003f00)={0x0, 0x3938700}) 14:08:23 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipv6_route\x00') 14:08:23 executing program 0: stat(0x0, &(0x7f00000000c0)) inotify_init1(0x0) 14:08:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 709.771351][ T34] audit: type=1800 audit(1604239704.230:329): pid=2249 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16368 res=0 errno=0 14:08:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00f00100"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:24 executing program 0: ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) rt_sigaction(0x38, &(0x7f00000001c0)={&(0x7f0000000100)="67e06866660f383c88ffeffffff0400fab18c4c1375f4b02df7cd3f5c4820d9aa69f3ed5aec462f58c35bf4619d68fc988016d006667400fa526440fff5d08", 0x0, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x8, &(0x7f00000002c0)) 14:08:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x0) 14:08:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000080)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x0) r2 = dup(r0) ftruncate(r2, 0x400000000000000) timer_settime(0x0, 0x1, &(0x7f0000000480)={{}, {0x0, 0x989680}}, 0x0) 14:08:24 executing program 0: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0xe3d902d6497696ed) 14:08:24 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) statfs(0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000000)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000013c0)='./file0\x00', 0x0) ftruncate(r0, 0x7fffffff) statfs(&(0x7f0000000140)='./file0\x00', 0x0) timer_settime(0x0, 0x1, &(0x7f0000000480)={{}, {0x0, 0x989680}}, 0x0) 14:08:24 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) bind(r0, 0x0, 0x0) 14:08:24 executing program 0: clock_settime(0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 14:08:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000300), 0x0) getresgid(0x0, 0x0, 0x0) getegid() 14:08:24 executing program 3: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) 14:08:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:24 executing program 0: io_submit(0x0, 0x1, &(0x7f0000014a00)=[0x0]) 14:08:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00000200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:25 executing program 3: io_setup(0x0, 0x0) socket(0x1d, 0x0, 0x0) [ 710.722519][ T34] audit: type=1800 audit(1604239705.180:330): pid=2294 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:08:25 executing program 0: timer_create(0x0, &(0x7f0000000280)={0x0, 0x0, 0x5}, 0x0) 14:08:25 executing program 0: ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 14:08:25 executing program 3: sigaltstack(&(0x7f0000ffc000/0x3000)=nil, 0x0) [ 710.872453][ T2331] can: request_module (can-proto-0) failed. 14:08:25 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x80000040) 14:08:25 executing program 3: clone(0x64ae4300, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast1}, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @remote}, 0xc) 14:08:25 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000280), 0x4) 14:08:25 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000240)='/dev/vcsu#\x00', 0x4, 0x101001) write$vga_arbiter(r0, 0x0, 0x0) 14:08:25 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000001b80)='/proc/self\x00', 0x82080, 0x0) 14:08:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:25 executing program 3: mount$9p_fd(0x0, 0x0, &(0x7f00000002c0)='9p\x00', 0x0, 0x0) [ 711.468962][ T34] audit: type=1800 audit(1604239705.930:331): pid=2341 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:08:26 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:08:26 executing program 0: socketpair$unix(0x1, 0xd2a7ce466ba2131f, 0x0, 0x0) 14:08:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x20c1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32], 0x5c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x5, 0x6, 0x0, 0x61, @loopback, @empty, 0x80, 0x8000, 0x9, 0x400}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'ip6gre0\x00', r1, 0x4, 0x5, 0x3f, 0x2, 0x41, @dev={0xfe, 0x80, [], 0x28}, @private2, 0x7, 0x80, 0x800, 0x8000}}) r2 = socket$packet(0x11, 0x2, 0x300) openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x430040, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000640)={0x28, 0x0, 0x2710}, 0xf, 0x80000) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000340)=@req3={0x100, 0x5ed, 0x5, 0xfffffffa, 0x7, 0x10001, 0x321a}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8936, &(0x7f0000000240)={@ipv4={[0xa], [], @multicast2}, 0x7d, r3}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000680)=0x4) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x54}}, 0x0) [ 711.804029][ T2384] 8021q: adding VLAN 0 to HW filter on device macvlan2 14:08:26 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 712.054695][ T2384] 8021q: adding VLAN 0 to HW filter on device macvlan2 14:08:26 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:08:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x20c1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32], 0x5c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x5, 0x6, 0x0, 0x61, @loopback, @empty, 0x80, 0x8000, 0x9, 0x400}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'ip6gre0\x00', r1, 0x4, 0x5, 0x3f, 0x2, 0x41, @dev={0xfe, 0x80, [], 0x28}, @private2, 0x7, 0x80, 0x800, 0x8000}}) r2 = socket$packet(0x11, 0x2, 0x300) openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x430040, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000640)={0x28, 0x0, 0x2710}, 0xf, 0x80000) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000340)=@req3={0x100, 0x5ed, 0x5, 0xfffffffa, 0x7, 0x10001, 0x321a}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8936, &(0x7f0000000240)={@ipv4={[0xa], [], @multicast2}, 0x7d, r3}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000680)=0x4) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x54}}, 0x0) 14:08:26 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 712.300856][ T2407] 8021q: adding VLAN 0 to HW filter on device macvlan2 14:08:26 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) 14:08:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00200200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:27 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) 14:08:27 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x20c1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32], 0x5c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x5, 0x6, 0x0, 0x61, @loopback, @empty, 0x80, 0x8000, 0x9, 0x400}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'ip6gre0\x00', r1, 0x4, 0x5, 0x3f, 0x2, 0x41, @dev={0xfe, 0x80, [], 0x28}, @private2, 0x7, 0x80, 0x800, 0x8000}}) r2 = socket$packet(0x11, 0x2, 0x300) openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x430040, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000640)={0x28, 0x0, 0x2710}, 0xf, 0x80000) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000340)=@req3={0x100, 0x5ed, 0x5, 0xfffffffa, 0x7, 0x10001, 0x321a}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8936, &(0x7f0000000240)={@ipv4={[0xa], [], @multicast2}, 0x7d, r3}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000680)=0x4) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x54}}, 0x0) [ 712.691384][ T2427] 8021q: adding VLAN 0 to HW filter on device macvlan2 14:08:27 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) 14:08:27 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x20c1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32], 0x5c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x5, 0x6, 0x0, 0x61, @loopback, @empty, 0x80, 0x8000, 0x9, 0x400}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000480)={'ip6_vti0\x00', &(0x7f0000000400)={'ip6gre0\x00', r1, 0x4, 0x5, 0x3f, 0x2, 0x41, @dev={0xfe, 0x80, [], 0x28}, @private2, 0x7, 0x80, 0x800, 0x8000}}) r2 = socket$packet(0x11, 0x2, 0x300) openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x430040, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000640)={0x28, 0x0, 0x2710}, 0xf, 0x80000) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000340)=@req3={0x100, 0x5ed, 0x5, 0xfffffffa, 0x7, 0x10001, 0x321a}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8936, &(0x7f0000000240)={@ipv4={[0xa], [], @multicast2}, 0x7d, r3}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000680)=0x4) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x54}}, 0x0) 14:08:27 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) [ 713.037044][ T2443] 8021q: adding VLAN 0 to HW filter on device macvlan2 14:08:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:27 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) 14:08:27 executing program 0: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 14:08:27 executing program 0: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x20000170, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:08:27 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, [], [{}, {0x801, 0x0, 0x80000001}]}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:08:28 executing program 0: bind$alg(0xffffffffffffffff, 0x0, 0x0) 14:08:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00300200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 713.627341][ T34] audit: type=1800 audit(1604239708.080:332): pid=2438 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16352 res=0 errno=0 14:08:28 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:08:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001cc0)={0x0}}, 0x0) 14:08:28 executing program 0: futex(0x0, 0x8c, 0x0, 0x0, &(0x7f00000000c0), 0x0) 14:08:28 executing program 0: 14:08:28 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:08:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:28 executing program 0: 14:08:28 executing program 3: ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:08:28 executing program 0: 14:08:28 executing program 0: 14:08:28 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 714.564017][ T34] audit: type=1800 audit(1604239709.020:333): pid=2484 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16341 res=0 errno=0 14:08:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00400200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:29 executing program 0: 14:08:29 executing program 3: 14:08:29 executing program 3: 14:08:29 executing program 0: 14:08:29 executing program 3: 14:08:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:29 executing program 0: 14:08:29 executing program 3: 14:08:29 executing program 0: 14:08:29 executing program 0: 14:08:29 executing program 3: [ 715.210157][ T34] audit: type=1800 audit(1604239709.670:334): pid=2515 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16341 res=0 errno=0 14:08:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00500200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:29 executing program 3: 14:08:29 executing program 0: 14:08:29 executing program 0: 14:08:29 executing program 3: 14:08:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, 0x0, &(0x7f0000000000)) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000013c0)='./file0\x00', 0x0) ftruncate(r0, 0x7fffffff) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) statfs(&(0x7f0000000140)='./file0\x00', 0x0) timer_settime(0x0, 0x1, &(0x7f0000000480)={{}, {0x0, 0x989680}}, 0x0) 14:08:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:30 executing program 3: 14:08:30 executing program 0: [ 715.845525][ T34] audit: type=1800 audit(1604239710.300:335): pid=2548 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:08:30 executing program 3: 14:08:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00600200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:30 executing program 0: 14:08:30 executing program 3: 14:08:30 executing program 0: 14:08:30 executing program 3: 14:08:30 executing program 0: 14:08:30 executing program 3: 14:08:30 executing program 0: [ 716.608737][ T34] audit: type=1800 audit(1604239711.060:336): pid=2565 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16352 res=0 errno=0 14:08:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:31 executing program 3: 14:08:31 executing program 0: 14:08:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00700200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:31 executing program 3: 14:08:31 executing program 0: 14:08:31 executing program 3: 14:08:31 executing program 0: 14:08:31 executing program 3: 14:08:31 executing program 0: 14:08:31 executing program 3: 14:08:31 executing program 0: [ 717.379790][ T34] audit: type=1800 audit(1604239711.840:337): pid=2584 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16348 res=0 errno=0 14:08:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, 0x0, 0x0, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:32 executing program 3: 14:08:32 executing program 0: 14:08:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00800200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:32 executing program 3: 14:08:32 executing program 0: 14:08:32 executing program 0: setuid(0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) 14:08:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 14:08:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 14:08:32 executing program 0: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) 14:08:32 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000001480), &(0x7f00000014c0)=0x18) 14:08:32 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x10001}) [ 718.331262][ T34] audit: type=1800 audit(1604239712.790:338): pid=2607 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16339 res=0 errno=0 14:08:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, 0x0, 0x0, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:32 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000001480), &(0x7f00000014c0)=0x18) 14:08:32 executing program 0: sigaltstack(&(0x7f0000ffe000/0x2000)=nil, 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 14:08:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00900200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:33 executing program 0: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 14:08:33 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000240)={0x1c, 0x1c, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 14:08:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000000)={@multicast1, @local={0xac, 0x14, 0x0}}, 0x9) 14:08:33 executing program 3: setuid(0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x400, 0x0) 14:08:33 executing program 0: getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) setresgid(r0, 0x0, 0x0) setresgid(0xffffffffffffffff, r0, 0xffffffffffffffff) setresgid(0x0, 0x0, 0x0) 14:08:33 executing program 3: setitimer(0x0, &(0x7f0000000200)={{0xc7000000}, {0x0, 0x7102}}, 0x0) 14:08:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, &(0x7f0000000140)="9ad801bf06033b9e3980635c2117444cc1adf5aa0f5d1a7683dc8ab84ac976231d03199c20323ac755fbd37cb7970d0dc3ad5cddf7c583d36bef27480ae00588f96d854f26e2a37932457c2466bd895d37bd77961ba6e39b5ada72635cded2f8173ed73252de93e6dff78001bd70b9ca53d47823eacdfcf00bab088d84bccd31eda89e7271643db9290267e46a88a3ecfdf80dae1bfee5fa79a8abe136701fa14d56b17c1d5ed23551c443fd8917b6b709c3ea8fc5661bf99955f74bebc5f085dff0bb9d526ac4a0e986e797d37500e5d9f617bb6005fe31d0cceba0f7059786953c7355c8dbbff541901fef440dddf5f1157966ec530b9d7c0fabdcf4b6a7c493333aa68f0c90549e42fd4c2e8bec4610f6287b5d11001dfa3f0a8b299e41a65d24a7f985b4fc96d9bb8209cd63cee273acdfd8451e9f1a94bd31a52cce6af118ca1a568f371fc14d438b0a65944bd2c2ae27be85ff0a62cefb7b2ffd2f6a8f39a95736e551c270c04a49e6a7e7c5f8e3f91ada021aacb5c716683ba2738d84717280fb82d21eff587a8d52af96c9036a80939edeff0b280d29755b57512ee4acadcbb90025417ff41a5b368e8e4895090764eec6c90877fed1c113d9047069a9dd6e555ea35fca72bc9603c15b07386b7b7a90887905326601930dd3e64ed475d07738774e5a7a126e39e27003a4eae1025bc73cd145683934b90a3fd6b40c698f1ebab682c23e931c00d99186d0ecacbf1781886e54a3549016db0bcbbc28440d9b2d72306a20427cd4722d67481713b90f32e1ebb0b6428c8d768c4ef46677cadef2bbd279d6ac246ff93deae58d021a301b22d13e6078d30a4daa61b8e5aac36d2dc1c19d43e331579c46417c2c3c2f546794ffc7464c4b0394b01d0ae3fbfc953a0c3de202b09b921fd3af815031ce4f78c106a58aef7fc29733b41ec271efd0b98082793e6d8a4edc18e1ae66a12443e760e3c09b59667eb814618660d4e039b6cc5aafe76e7fd27e8492cec33e210159225a936b767a491abf8f8df5e10aeeebf4c5332e34cee5fe9576d34bcd827e92365c49d422bd5070538fa4f141927e79250f07962d7d314321f68dbdcf531fe420d17c5b948b67eb9e820cb0dd685c69ec4c0f3e2a3c27e9510bb0961f5bc8fc3370623aec2e1ccc78c4edde54860fd80da0e0f247617cd2846944e67bf030ca45c66ff6e5570163afe4ae79c13cc1bf28b225dca2761f38d997a7c8dcd33eca3fc2df9883edbd803b87e7da50e429da1b9096a102cf54d0f87e007e8fdbd5db59ab5877bfe140beed3da09a1b4c25deb0e0c7f3cd7a89282c7e87e07098ae56b98be44739e8b94b0b8370e810f95b2838225380e6a34d269fda596a59eeba3cd0790f77fdd6ba74f212174035bf1d842b415aebe504cdf9b08893f77674a8cdea00ed4058aa293d4fc45b7ff8983c7eb878db3eee7ef3deff9c25adf9a58145422e860667ee910b479260379b3ea97e87809bee172a8e2947a6ba772c57f8e4e3f17f763fbe49fbd0a0df25669694404a8eeb74a926118ccf1cafcee0b04e4ba953091a26016bbca83975ad759aabe64d07050212e53092ea80d15a38d8be492e7d567a6cb9522b0496bfebd67700b1fba9e221145860eae7849ffb935f160bc5cc47d82d8f46e01eece477486ecd90add382049b2fdb7ea9d2cba3b44b6747b0ee4140c7d7c83489e46431a4ddc66f1856cec8799085ff8c88afad186460ef280069a0cbe937fe43aabd5567ef29c77ab37bc01290f58e247362490e8538df8ad1cb4a6ba89b00aecf4a04e7462e294f643e5bcaa686421efe2afda33c809c61781435a56d36083f85fcf98e335b4e9ff215f5853a6d159e16569e589d97ccd81aeb126961454eb9d49b9b821b42edaa171fb44425bcdf71a3ebada8e529cb9c94620e31f996641c730ef0615f29735bb1ea369758448db235f64501957ecbb8c963998e7ad1cf14f631aec29542aa963dbc80b694a2a336b42cdf479f7334225ee4cf4f3124d8afd562f482a23724aba5be8f3aaa62cb4a63d26068783812", 0x5b4, 0x0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 14:08:33 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x30, 0x0, 0x0) 14:08:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, 0x0, 0x0, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 719.243043][ T34] audit: type=1800 audit(1604239713.700:339): pid=2645 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:08:33 executing program 3: r0 = msgget(0x3, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x1800) 14:08:33 executing program 0: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 14:08:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a00200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:33 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) 14:08:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000000)={0x0, 0x7fffffff}, 0x10) 14:08:33 executing program 0: setrlimit(0x0, &(0x7f0000000000)={0x10001}) 14:08:34 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0xd) 14:08:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f0000000040)="d3", 0x1, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 14:08:34 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000180)='#', 0x1}], 0x1, &(0x7f0000000500)=[@authinfo={0x10}, @prinfo={0x14}], 0x24}, 0x0) 14:08:34 executing program 3: socket(0x10, 0x0, 0x1) 14:08:34 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000180)='#', 0x1}], 0x1, &(0x7f0000000500)=[@authinfo={0x10}, @prinfo={0x14}], 0x24}, 0x0) 14:08:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:34 executing program 3: mincore(&(0x7f0000ff8000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/237) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, 0x0) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3) [ 720.132873][ T34] audit: type=1800 audit(1604239714.590:340): pid=2697 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:08:34 executing program 0: pipe2(&(0x7f0000000ac0)={0xffffffffffffffff}, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) sync() r1 = socket$inet_sctp(0x2, 0x5, 0x84) getpeername(r1, &(0x7f0000000140)=@in6, &(0x7f0000000180)=0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4(r2, &(0x7f00000001c0)=@in, &(0x7f0000000200)=0x10, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x54, &(0x7f0000000000)={0x1, {{0x1c, 0x1c}}, {{0x1c, 0x1c}}}, 0x108) symlinkat(0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x104) 14:08:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0a01da"], 0xa) 14:08:34 executing program 0: nanosleep(&(0x7f0000000000)={0x0, 0x9}, 0x0) 14:08:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 14:08:34 executing program 0: fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 14:08:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) 14:08:35 executing program 3: select(0x40, &(0x7f0000000080)={0x6}, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x10001}) 14:08:35 executing program 0: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendfile(r0, r1, 0x0, 0x0) 14:08:35 executing program 0: sigaltstack(&(0x7f0000ffc000/0x3000)=nil, 0x0) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) [ 720.955894][ T34] audit: type=1800 audit(1604239715.410:341): pid=2742 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15794 res=0 errno=0 14:08:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x6, 0x0, 0x0) 14:08:35 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000180)='#', 0x1}], 0x1, &(0x7f0000000100)=[@authinfo={0x10}], 0x10}, 0x0) 14:08:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c00200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:35 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 14:08:35 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="ab4d61d36a10", @random="a47b3ab31029", @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @broadcast, @random="87c9bdc86bad", @local={0xac, 0x14, 0x0}}}}}, 0x0) 14:08:35 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockname(r1, 0x0, &(0x7f00000000c0)) 14:08:35 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) 14:08:35 executing program 0: sigaltstack(&(0x7f0000ffe000/0x2000)=nil, 0x0) mincore(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0) 14:08:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000100)={0xfffffffffffffef9, 0x2}, 0x10) 14:08:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockname(r0, 0x0, &(0x7f0000000040)) 14:08:36 executing program 3: fcntl$lock(0xffffffffffffff9c, 0x2, 0x0) 14:08:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d00200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 721.898939][ T34] audit: type=1800 audit(1604239716.360:342): pid=2775 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15986 res=0 errno=0 14:08:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights], 0x10}, 0x0) 14:08:36 executing program 0: setitimer(0x0, &(0x7f0000000200)={{0x0, 0x94b}, {0x0, 0xf423f}}, 0x0) 14:08:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0xb9ccab1692f97ad1, 0x0, 0x0) 14:08:36 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 14:08:36 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r1, r0) 14:08:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)="dc", 0x1, 0x0, &(0x7f0000001000)={0x10, 0x2}, 0x10) 14:08:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) fcntl$lock(r0, 0xb, &(0x7f0000000000)) 14:08:36 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0x69, 0x0, 0x0) 14:08:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) fcntl$lock(r0, 0xb, &(0x7f0000000000)) 14:08:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 14:08:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {0x0}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 722.834538][ T34] audit: type=1800 audit(1604239717.290:343): pid=2848 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15939 res=0 errno=0 14:08:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00e00200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:37 executing program 3: fchownat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 14:08:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 14:08:37 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@random="c3eaf4665399", @remote, @val, {@ipv4}}, 0x0) 14:08:37 executing program 0: syz_emit_ethernet(0x14b, &(0x7f00000002c0)={@random="c3eaf4665399", @remote, @val, {@ipv6}}, 0x0) 14:08:37 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f0000000240)={0x10, 0x2}, 0x10) 14:08:37 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0xa, 0x0, &(0x7f0000000100)) 14:08:37 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x401, &(0x7f0000000080)="49db6a34", 0x4) 14:08:37 executing program 0: select(0x40, &(0x7f0000000080)={0x6}, &(0x7f00000000c0)={0x5}, &(0x7f0000000100), &(0x7f0000000140)={0x4}) 14:08:37 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000040)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 14:08:37 executing program 0: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000280)={{0x0, 0xffffffffffffffff}}, 0x0) [ 723.559955][ T34] audit: type=1800 audit(1604239718.010:344): pid=2863 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15923 res=0 errno=0 14:08:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {0x0}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:38 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000000)="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", 0x999, 0x0, &(0x7f0000001040)={0x1c, 0x1c, 0x2}, 0x1c) 14:08:38 executing program 0: open$dir(&(0x7f0000000040)='./file0\x00', 0x10202, 0x0) 14:08:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00f00200"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:38 executing program 0: syz_emit_ethernet(0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="c3cd583c3508000000000000000000040000000000000000da49000000000000000000004e234e21000890780000"], 0x0) sync() 14:08:38 executing program 3: setrlimit(0x8, &(0x7f0000000000)={0x7}) 14:08:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 14:08:38 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000240)={0x1c, 0x1c, 0x1}, 0x1c) 14:08:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a0102"], 0xa) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 14:08:38 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x3}}, {{0x1c, 0x1c, 0x2}}}, 0x108) 14:08:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a0102"], 0xa) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 14:08:38 executing program 3: shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x2000)=nil, 0x0) [ 724.385146][ T34] audit: type=1800 audit(1604239718.840:345): pid=2906 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16116 res=0 errno=0 14:08:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {0x0}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f00000001c0)={0x0, 0x0, 0xd6}, 0x8) 14:08:38 executing program 3: lchown(&(0x7f0000000080)='.\x00', 0x0, 0x0) 14:08:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00000300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:39 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x2}, 0x1c) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, &(0x7f0000002840)=[{&(0x7f0000000240)='\t', 0x1}], 0x1, &(0x7f0000002900)=[{0x10}, {0x10}], 0x20}, 0x0) 14:08:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/ptmx\x00', 0x0, 0x0) flock(r0, 0x0) 14:08:39 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000000), 0x8) 14:08:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/ptmx\x00', 0x0, 0x0) flock(r0, 0x0) 14:08:39 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000140)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}, 0x0) 14:08:39 executing program 3: sendto(0xffffffffffffffff, &(0x7f0000000140)="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", 0x1000, 0x5, &(0x7f0000001140)=@in={0x10, 0x2}, 0xfffffffffffffd00) 14:08:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000200)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0) 14:08:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(r0, &(0x7f00000003c0), &(0x7f0000000400)=0x10) [ 725.268963][ T34] audit: type=1800 audit(1604239719.730:346): pid=2947 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16100 res=0 errno=0 14:08:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(r0, &(0x7f00000003c0), &(0x7f0000000400)=0x10) 14:08:39 executing program 3: msgget(0x0, 0x184) 14:08:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:39 executing program 3: r0 = socket(0x1c, 0x5, 0x0) connect(r0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 14:08:39 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x2}, 0x1c) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000240)="0985b4597f4e2ed9253ae30e3d2980f7f3a194ca3e9654b9c852680dcee7b25ae1bd20939f4a0b9e366ebff085dee43e5122206b8cbca2a7d54ba9b94783295f996f30fe6f04767cfb1f69bfc7264543de4f0c58914802d667ec5b03ef571ba84c7486740335a93ab4b64bd08f7e8eba9f5db2d66fea3a7910fc76baf098d75eec9596d0f9b0663de3d8c3e4d718cd55ea988abe704ee5d53b01ae0c28a147e8281f4b8849718f7670ac92cea3793be1bce35b5e333ebadf", 0xb8}, {&(0x7f0000000300)="2f2ed625da2eded05201c9ca44a1e4ffcb305dd1389a3339714c05e7e4686bad81dea38d8f1a54b2a72dbfb91bf052f07f29f9fbcca3b276ed63863a5ea7fdb3560777685c17073510e898c75c9c2b20f5a2d98fe68be61c8b90170105ebb21e2e1ab388c5a7a3eb7365e6659b51f4ccca8b4e8804f6e4c1e5d6ac95466bb735ad2391b918f1b4b039b530cb8b05bc4c7a6684c7fc32172f7569f52c0ad89ca374dffff747acbd36356a341bb2273d2c65248f86d10a1c71c65bb21a2746a38623d1187dc388ad8b5987fab603a30e009b8be888f76d3243c191a606641751ea8307b8ace49a", 0xe6}, {&(0x7f0000000400)="6e58540631264d9effcdfb4148482d14bfd4ec9ea21f7b8b657969a3d9640e586a3968afdf5a41329f42233b28372e06679e27a6533b69e3dc884272747428955d947eae695a46fd574b7d0ec08310c5d21c9d0617581da90bdcfbbe127b169203b47bafa96c322945601068fa2607e930f0dd938b52578c474a32e899d46f700f5c8539d5b7720c13ec5f35fc2e1a95c75cb668791a48b8eff71ecf269f4a9c56d4d5", 0xa3}, {&(0x7f00000004c0)="230ffd3d32329e77f2225e421f9d97ecfad6486a3dd182e770afc498cf5245bcaae19d5ff7ebe9408875ccbfede305904afa4dd7ea688f2ab010106751519505940c01b657cfe5a91818162aa18c4e4dc8481eb44822679e31b3c6082201848110b2aa4dfc8a33a61930ec712ebcf28d2a3cf51a7648b6cfbd314a680ea155edef0b09f43409008c3b7d42a5b378ab551532ca77a10fd1be0728b7cddc0a7e161f40fba9dd2d0aff3398e34369bab017676e9e9f33a52e0c0b593662920db3aa27c12347beb8a26ed94ad0be94c195909c61006b3a3f47ca7908b3fa357e788a1d88ea1883cd1bd346bc76f741eda4833950b0a07c798aafd548558178a6bb699a71b2ebc4c1829d8cad2290337d33924d2a866699493ad387dabb269ebcc9b7e19db0d850c8b79e7201c7c69dba0464ebc49426259e8ed5b3ed5b315b3fd8d25bd549d6dbe14c501087bda6aebc08cab3b79dbace488496e2ce48e1b6a6489bc72ecde6b17a3996139aa9f312fb9d27f5f0b2a295a8476adc8464072356f91ef34fcc7bec8065289518e364905544db10c02386b7bcb68ce6c378f9a85787abf0a01a536e0f42158099cebd32f45b699a27f9a88e78eda9a2a2f138499be0feb5663b9ae07ced5b21cb2d2300342d2f358d3b8cea971db0c74484386e731bd6c33ba423a7637676d1e0a7daa089b9e16dfa102c8bf7424469a450f4a6aa48ea80909c2eaf3dfc9a74a864f3878fffd912a64daea9d73d992f90629d40dce966bb938b97ce947041bcb8ca98b9290e204429e7e2c1ea9d270e825d4cff73727671feb1f45b22cda96b7a4a1299d55a208a4bcd67a5028097ec665c92dc8db42cdab1f4d0ed6dbf76b84110687f4e93437210980ab73361aa46d832784558b84808934fa98d7ee9d0e0a84452ea29e644194026b7e37bab1539a68035b5255ad8e712777a559d65cfa4fced1985f7a450f40f546276d5ad74c847a1f1beb6756c1c4474f632c21f06d98e131ff43b280b3bab81b2e2974baa8c6b343cc555221c3a3f816f96eb23582e0aea38b11ac931098db2453378227e9e88ae84e41fa0d92269a4ee5a95f675dd4ce7baae56c2af581f2fcfd3dd4908f3ab0af7013b3a279a35ed0c664c4517e3ff4ff75fd56d85c7bcfec6d6165eea4a70b2ff1732b42ca82e426ab0ddbee3e385799f39a3f6acc7219e2d6ee6d1a2f1c1fcc2b9543ef4923d36922827a00d450ff78f0f1020025761178e1a284047507367af25480574e022e8e9d26fd1d4ab0d9ed03249bca30d9db975481c539cbd3cd99f91c2fb42196216029830ccbc9df64d2ef2bef00e9085cc45c3d933489eeddda4c0ce936b7ec1f506ddaf6cc10e713ab4ed5cde6b5ccee7099f7a2dfb8b3e963775ee5a1b5b07266d3348bfe1c370d0c491093133dd5ec6382b4c77091ba603938f39c6bad123e12155758da3186d45e17840893a001c113266473f9918ce8531558f55771594b9104cc1396ad421cf0b2b2e6a70b4d5c2d8a383fc0d5b6738be6b7bac30c16cdfa5294d8c2fcaf24a5388d1132126b95bcd62f221278834791f49818d763c644f4e6a6a80464b56b48352b82d519be0ebe06966c0cf9ea8ad376cf976dc95e2f9e6228b69fd001b0c21d93469499ec805aad47097e056095a9d43a4c02da1be92159815c5bf17074e7275ece3868de7cabb0519c8b923f9892abca6ebcbbf8556bab38250eb89ae565df25311067c17cbad393f5ab29941e97f0ca5a4e7feac777488884a0da3cf9080605c32735c81be0ae9de5ef88844a686eaece2194554d81cd5911c1c0609c0888a3389bac9268658f702e956eab95e0398edaca57f751244f5854e19272bed7a6d7e9b902397469ca7986cc6d6085d94614e4aa4af354458c3c7dc2b1746a0e9d835acb5be74b2121e4ccc2bb778762f7328aa368bcba7b5635868fe7470ee28760b31e6966c34232cb47374f2554db5be8de0c88789ec522caf7da4cfeea00c0dd97f3e9894a9cffc8175b46db31b23538d601178e033b58792537b65d0a894413a50884f40ec00fb69b8b78013ca07c7b3e175c3c379f3e3a5270ec81b88993adca8422dd61370e2f3caa15ff05e7ba5f8c8f22864019d1d0b1305c038111cc9c948b285b821bf90dc2508497c6e22435c9e4cd67284573bb69bfbeed6729844dbfa739f129a9cf608d9ba09e3ad80561e9f077bbf2c630864c3f8c7246d4c6076590873667eb1bf2280d957bd636368c799f6974a0579e5677a3037a6ccee9e93812802766e70a53bd0f7d11ad92f239eef7dd9a0960788abefe499fc5aee70fc63aa529dfd0dfda3f280cdf9a143b7cb83477a507d80e5661e4795c16179e428fd949d49618fd529bcd90c07ac0c87b90a40aa773ad21d89b040a7b806a4f567af87cad3ae95a8a8b9dcafdfeff216cfb18dec9e8f576a7baf030e34971dc0f5057c56aea4e259a474c5b77552f592b1b83e2526bc36fb4cf1cabd6c1238af0f4167bb2e0ed50eb4ec6a0f1ad655c189f6ea7117cdb9d5569b3d1097efe40e26e22c33a02e8970036fbff477002e3f30a6b9f8f5cd4d1e46f462695f419fd468241b1f466c66a362175d39b1a47af1055e57b4ebdb063a092f24a9e83ec4c09a3bf6785654ee58435f0274dd2cb7da81acc67ddb924401c157d70192a36463ac59b9a35ff88e097202d99df800f2dc1ca1e21f65e1f3934cbc19acbb730ec1535ba6dec0ec2518512cf54ff255c3c72fcdadcae2a22557b254d31facf18441336ec8b55d8a581fe9b468b81de87acd9f9d3a52728811ee10a72d4c9d0766fe47b547fa20c2bb0bdeefa1595cea56aaa0bd8c054200d092d64944b457825fcf11ef51d2cef6b9b771015f7ed89065c61020ba47eee49668622f513ab7af178f1211452a5d17c9238d0e1b50db9fb798ef9ca5f0ac93122e971237da7d103b0be772d3900c65af41e9e85453c8dbe7979d5a4d8020e48972b667d7954bcd6d4339b7e310d6aa6be35f1279a1180a81205fe61168fcad90a4f43e4ed9e7767192d4f44bd91777894dda7b60baaf13f98202b3d478d0c300f2cd6ac9fe0b446169352515499e17a015132613d70f1edcd65b4af3f0e33ad28c9281649b1ce0f3564957d0233852476028aa26eef9dc142331b147684c6412040ecd4e65130c5877304af0d7507f86b4e0907427ede1bf32828e309778a0a7212a258563bad5cf7ea7355bd667d2d6f94eb0554b60640919d9529ac90ca1134268b1a817857d85cd7598eb8ef5848d3f223edf312aaac5e6409ffde4b9b48245d3901c50e8f85fac9d6cf354948fecb6a35dc9ad2d73a3ecc42597fa4d4261fc32b4a5c066008bf6d904167c8ff6f23e5e2176f26ba18ef73a2328fade907fc27e9d221191fc19a8038b1ab297861e9314b333c6d915b5a1398eec40a66596cf413de5c0fc4ee761a71ed31be4366762092aa47ba3863566c78dda0024a551aa4538cffc16d3de761151c24a45d29215eb95f642c8d3ba75020fd4abb67d5409b7ffabb8915d3fc17dea55a760da6e8406e86b466605e97519136a55b94412d271fa3c2f9bfca3128d296df1849db9f94e1f7577b87e9dfe4c54ff3d798c29884e22d0023de5a53d87a108f85365c0fdf7d06ac600ff4b246ab0eb5e1607729de6508b7d3890a80c9c879a1da775c0603575ea783b3ea2006a2a7136556422c3ffe711212f8d42b4dc15f865f006f9d3fd91327e50cbc69b17944c0460255f546db05b2ea18330a008804e8612a7b30dd199eefdb048940945a97bc645a9b5b5a64c8eb1d714219d140c1ff9a656a680b89691ad9ce3e685bcf49ef4006ea91dcae1bff04810c96e1eab9eb0ab9088b1bcbfd9e70798f43e5d23babff7d57787543a6fddb93a668f694ee9ec233fca2e8518ba5acb8be041755162256b61cd3befd0e7768ac76f1e9a2e5c096c595a26f885d24c4e77d2fe5c811a502b56294c7bb3bb9257acd4e6561c783890c1ed51327411c9de5208d6efcf0a545c6669cfca45367dd358767c6f5a883cdd9dbc532e5b77785ef8c22a9bcc1f13be4f97ea85bad8a54e0abd4a35c601d8082c5e70745533718539a61c0777de050703496284a6a9b7fbd5983c3303224189ed6481934de185d8666971400665083a94ed879deeead6f610f5317539fd1056326058136ff9bb247a01e5c3ab066c3b0852d9355d56f7ad27d9c089d2702deaf3ac073f41d32b91d707049246a57c412b52064edfd06ae32041f7c977d5524616698b3a870048f36edc9f1e568f8f51ba0f0b6c6ad9b6a9b3ec8760486d465bd2c4d765934b8afcbf2d37ac752f81aebd04a05fc781e8202dede3501fcb5f23be6b15e171f583661222d6f62ac82eb5e4cba550de2da2271d1385c144776b2ecaeb70b8358b9c83bcce8f8fd9b04180f06f2d4e6a8b1275010b505309bda3b07748e50afb319123eb09099f34037a6532b4ac93445770562b772ebe0f6f326ac7014033ef6da9b746fa03ec1f613949fb8b4bd11eca1a16807305f8db230c7dfaf422fc8867251498105f5ce76f537478f6604024912948672fdefabc11f77335db506b67dba7c374c2f054d5d7d1534a481ab79a6f74aec1781084e0ccb724f53824a03cdd80b3772a86a0453e1bfbfbcc10d7c838d75d140cf0ac3d4f36e5f83ac7a2fd1875999038a97cfe3c6eb405f08eb82483949ac62e4be24a26da11376fc15f38ae8881146b4b060bdfc3359a45c04f514eaebdcca18b25df17ec6e7f1350be0a38f92d075f88d72369e3ccfc05da419fac1563f2db69beece21c9bda1667b220b7da89470067d26d59e9f9dac3c398c58d893ef7d15f26176d943c5284e721a40e35c35f0266fec864cc98d497cb86696c40022dc2695e745b3ed6064fb9a749972812d9ab0fd217eee25b14e57adcd42db530d2e345255dbf787fd3e96bb573961763ef833656d9c119fbbc9760f7141fd67d5cb0f6f3761760bfb7cbdb67992047db1732b916e9e9074c117cd6128b12d490a8a9a0c09e55954d5c54df7fd1845d515ff9cf9cb3aa8a3e38d16f24f8f5c59d7350c27cec2c2761610c2fcf8c4f156ca2cac09288c66705643dbda12fa392a9c20c34c2dc5e25d99f2580474f99411d9a6bbfe1b46f68a67e8b80bb97c1e2ad1a8ebfd0456ac5b690d36b6e8c29a9d5912987deed6d91da9f7a762f3409d707772b51879dcd7ca765efa5358e49f39b60cec789ef46237907f8d5c54e463553d6e5c3ab7634939684454f011106f0fcd0bd52430eb5db2f45349d24325b0c2a1d29fe188fbb9f59a4faef750e6650a139dc827a29d825ab33807daf0ce4ed42da1d4146c50b2ce0fcfdca5064bed61d775f9c1654af615c4b039dfa31b437c84f1d2b953af666024033785e79b0276da10805872ff1ca0e44bc940411facdc4803df38baeaa1dc01a893dd700a0b8395f63a59754be7f71aa7bc4ca3e00fdd6e4b34fa15f3fea5c3e88def97fb05609d349ad7a01f75920a5affd498027f756298a18fd31ea5460e0452d7ed30d5a72e5c40abe0db31fcaa71f8b90f220c46f03dd0bd204c77fc84a60d9afdebc8aec72c2325d66610217ed253ff6843d06bf3cecf3a7a1dbb5a28d58b6e0fe48743cb25fbde71459008f9c5e86eead2769e3d8397b3f252b50b646ade7bedb0de5542a85fc6c7278b4791d6893b40397a4477298029ae8be1477301ba221be42a74d45411c0aaa91a40078c78334bca4c004e0e1be1171938667ac04aae6915ac710735ef043831c", 0x1000}, {&(0x7f00000014c0)="bb104d8b2fe1f950e72e6247a7709df7af72079a285dbc48b793cd4dc7a5da587b8052f6d71d15ea56571baeb57e373c85e25eea86dc15099ec9388b678bfcd8159b690c5340ffb273094bcf9644b674852fcecddd78564ff926cba7bc298d32506a267399aacdc2a840f7ea341580d7d7ee18e0078c673ac47093996ccde3060702095270654df8a7850ebb8b3aa23d6d6d8f90c65aa12bfccda7160981332e0d134ea2e0f58ecb71300351da10916208cd121856fcfb0c601768acb606f030bcdd1bc7b2145c7f7c0c9939ef201a69c29d21fdf63205153a22f1e00b371c7005e1f068f3957e", 0xe7}, {&(0x7f00000015c0)="923e3d282845c7c9943aada191c13224cdc74dc2cc9c4928dd429e84e43a72777ffe2276f675d6311fb4dbd01ad5d262583b6c52a41e745f7feb876a38da89fe59d879a8a1d723cbe410cdf49574866caccb1011c93bda7f1412224f2b333533042ef169cc2f5173151a33c0e207b7fb383d99a48972088940c99aa2f9944385d476c47c43166f276bc72cd20a31673f95b66aa6bffb9ba12d19dede711a8966d0d384c80b6ce40181b9a9793996a522860515ace0513ab7eeb6871c842b44f9ff926b6a62795c8be65cfc52db53d6303db670a4b7b0ee98bf33dcc600d918321c302b7f51510a6bbbd7529e", 0xec}, {&(0x7f00000016c0)="d973fa3c060d3fa8b9225e04b66ff108e2c3cd96aec47426e6df38dc3047ddf0f001ec3fcdc587ccb676bca49079ca3c714af917030879830804ea27f2af6a36dee9f8b39c935e098b34b6592343b3d86c4a164fe482c0c0961dc193d4b079f694a8eb7c7920695a578889d1d1d5773398de405277becde5c0116fd932c38a2378b621806d5188409fff44fc2d10c9351a42e0ae379c39e51023682656eab02810d29c1b9ed4bf97c11e42e541bd618983ee", 0xb2}, {&(0x7f0000001780)="e344def98cb4f5f3e70fe4c2f1375f80a120074e0dd4faa92cad9ff1f11c4acb2065800984cb2ede6b7d520fa0bbbbf99cb3e483ff7f06ca148394ce1a72cbf17b8e9f0678c6c04300c549accb88fd0f85585314be2b3d9f972fa4c095fe35de437bad3849e8b9a5e26cbfb0f8cd4fc9ddd2877588bf2e6bfcb90ef341dbfcd12fcd54dececdb9a09dd9e2a51e01000834c4569ecfb6fe84722c77cf18d819cd06", 0xa1}, {&(0x7f0000000180)="892be95e387ed6ca4d554e6c5488a1b1fe11571108b96689d3e613a5bfe832ef92352a6293079c005f2b", 0x2a}, {&(0x7f0000001840)="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", 0xa60}], 0xa, &(0x7f0000002900)=[{0x10}], 0x10}, 0x0) 14:08:40 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, 0x0, 0x0) 14:08:40 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000500)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000200)="bd", 0x1}], 0x1}, 0x0) 14:08:40 executing program 3: semget(0x1, 0x0, 0x304) 14:08:40 executing program 0: linkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x0) 14:08:40 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x104, &(0x7f0000001040)={0x1c, 0x1c, 0x2}, 0x1c) 14:08:40 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000140)=@file={0xa}, 0xa) [ 726.113394][ T34] audit: type=1800 audit(1604239720.570:347): pid=2992 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16100 res=0 errno=0 14:08:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:40 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000240)="cc", 0x1}], 0x1}, 0x0) 14:08:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 14:08:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00200300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:40 executing program 0: syz_emit_ethernet(0x1055, &(0x7f00000002c0)={@random="c3eaf4665399", @remote, @val, {@ipv6}}, 0x0) 14:08:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 14:08:40 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001100)={0x1c, 0x1c, 0x1}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000100)=0x6) 14:08:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) shutdown(r0, 0x1) 14:08:41 executing program 0: syz_emit_ethernet(0x10a7, &(0x7f0000001240)={@random="c0fe53a7c584", @random="5a010b0000ca", @val, {@ipv6}}, 0x0) 14:08:41 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0x1c, 0x1c, 0x2}, 0x1c) 14:08:41 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f00000000c0)=@un=@abs={0x8}, 0x8) 14:08:41 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x800000, 0x0) [ 727.004446][ T34] audit: type=1800 audit(1604239721.460:348): pid=3087 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16147 res=0 errno=0 14:08:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:41 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x985b9990b6019721, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000340)={0x1c, 0x1c, 0x3}, 0x1c) 14:08:41 executing program 3: shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) shmdt(0x0) 14:08:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00300300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:41 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 14:08:41 executing program 0: clock_gettime(0x0, &(0x7f0000000200)) 14:08:41 executing program 3: shmget(0x2, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) 14:08:41 executing program 0: socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000001800)) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 14:08:41 executing program 3: syz_emit_ethernet(0x13e6, &(0x7f0000001480)=ANY=[@ANYBLOB="aaaaaaaaaaaa1bf9f7ff407886dd63"], 0x0) 14:08:41 executing program 0: socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000001800)) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 14:08:42 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 14:08:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f0000000000), 0x352520802741d540) [ 727.921322][ T34] audit: type=1800 audit(1604239722.380:349): pid=3130 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16193 res=0 errno=0 14:08:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {0x0}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:42 executing program 3: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, 0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) 14:08:42 executing program 0: semop(0x0, &(0x7f0000000200)=[{}], 0x156) 14:08:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00400300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:42 executing program 0: mlock(&(0x7f0000ff9000/0x2000)=nil, 0x2000) sigaltstack(&(0x7f0000ff6000/0x3000)=nil, 0x0) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 14:08:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 14:08:42 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0x0}}, 0x14) sendto$inet6(r0, &(0x7f0000000140)="999deeb2d1362332", 0x8, 0x0, &(0x7f00000000c0)={0xfffffe54, 0x1c, 0x1}, 0x1c) 14:08:42 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x985b9990b6019721, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000200), 0xc) 14:08:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) fcntl$lock(r0, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000000000}) 14:08:42 executing program 0: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2) 14:08:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_buf(r0, 0x0, 0x50, 0x0, 0x0) 14:08:42 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x2}, 0x1c) [ 728.765537][ T34] audit: type=1800 audit(1604239723.220:350): pid=3147 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15764 res=0 errno=0 14:08:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {0x0}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:43 executing program 0: socket$inet6_sctp(0x1c, 0x0, 0x84) 14:08:43 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 14:08:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00500300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c}, 0x1c) 14:08:43 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x100) 14:08:43 executing program 3: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000280)={{0x0, 0xffffffffffffffff}, {0x0, 0xfffffffffffffffe}}, 0x0) 14:08:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/ptmx\x00', 0x0, 0x0) flock(r0, 0x2) 14:08:43 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/ptmx\x00', 0x0, 0x0) 14:08:43 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/ptmx\x00', 0x0, 0x0) 14:08:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/ptmx\x00', 0x0, 0x0) flock(r0, 0x2) 14:08:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000380)="78a309a26d0a5356a18a2bdb3eebe35a3bd0f256be30230c7b5c61bed339de94f1dc04cf96a641914d2ef659c652e9e7efc06e8bfa25344c470cbc0151c500c4d2b155ae6d0c354bbb294b49bef4adb1d1fd5e2bcfd631de8ed3f395f40a807b716eab434b6ee2d65734bef43fce8638ec059378b2f113f89c633700477e2510e493decaa1afa6315379e119caa80c2bc2d0795d5d69a406dcf950915168e0d0c61b8f688b096e1455e44629c93e77cc0ef1603cf4bf9ee5ba16a5664a20faaaff1df857675726d7f9f777a4763dd88b12e9c39212fe3604fdebe77909d49b2667", 0xe1, 0x0, 0x0, 0x0) [ 729.585746][ T34] audit: type=1800 audit(1604239724.040:351): pid=3192 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16243 res=0 errno=0 14:08:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {0x0}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:44 executing program 3: getresuid(&(0x7f00000001c0), &(0x7f0000000200), 0x0) 14:08:44 executing program 0: accept(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)=0x25) 14:08:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00600300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:44 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x40, 0x0, &(0x7f0000000040)) 14:08:44 executing program 0: getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff]) setregid(r0, 0x0) setregid(0x0, 0x0) 14:08:44 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000001140)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 14:08:44 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f00000000c0), 0x10) 14:08:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) listen(r0, 0x0) 14:08:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) fcntl$lock(r0, 0xc, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff, 0x100000003, 0xffffffffffffffff}) 14:08:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 14:08:44 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) [ 730.380473][ T34] audit: type=1800 audit(1604239724.840:352): pid=3231 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:08:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800) 14:08:45 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x2}, 0x1c) 14:08:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00700300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:45 executing program 3: faccessat(0xffffffffffffffff, 0x0, 0x0) 14:08:45 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200, &(0x7f0000000080), 0x4) 14:08:45 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001100)={0x1c, 0x1c}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000100)) 14:08:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)=ANY=[@ANYBLOB="1c1c4e2000000000fe8000000000000000000000000000bb00000040f09b9c1c00"/133, @ANYRES32=0x0, @ANYBLOB="00000000ff"], 0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0xa0) 14:08:45 executing program 0: getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) setresgid(0xffffffffffffffff, r0, 0xffffffffffffffff) setresgid(0x0, 0x0, r0) 14:08:45 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, 0x0, 0x24}, 0x0) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) 14:08:45 executing program 0: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 14:08:45 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000280)={@broadcast, @local, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @remote, "", @broadcast, "085765298ccb1ed47852dcff4cea88b2"}}}}, 0x0) [ 731.386875][ T34] audit: type=1800 audit(1604239725.840:353): pid=3281 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16342 res=0 errno=0 14:08:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:45 executing program 0: syz_emit_ethernet(0x42, &(0x7f0000000040)={@local, @random="d401000000ca", @val, {@ipv4}}, 0x0) 14:08:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) sendto(r0, &(0x7f0000000040)="28b002bd5c9144daf316b0f7", 0xc, 0x0, &(0x7f0000000080)=@un=@abs={0x8}, 0x8) 14:08:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00800300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000100), 0x8) 14:08:46 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f00000015c0), 0x4) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, 0x0, 0x0) 14:08:46 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 14:08:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x9, 0x0, 0x202}, 0x98) 14:08:46 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x181, &(0x7f0000000040)=@in6={0xffffffffffffff66, 0x1c, 0x3}, 0x1c) 14:08:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x4a, 0x0, 0x0) 14:08:46 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001100)={0x1c, 0x1c}, 0x1c) 14:08:46 executing program 3: select(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)=""/244, 0xf4}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000800)=""/199, 0xc7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffc2, 0x0, 0x0, 0x800e007cd) shutdown(r2, 0x0) r4 = socket(0x2, 0x1, 0x0) connect$unix(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="f70276d21f"], 0x10) shutdown(r3, 0x0) 14:08:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 732.360536][ T34] audit: type=1800 audit(1604239726.820:354): pid=3331 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15754 res=0 errno=0 14:08:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:08:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00900300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:46 executing program 0: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@random="c3eaf4665399", @remote, @val, {@ipv4}}, 0x0) 14:08:47 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f0000000200)={0x5, {{0x1c, 0x1c, 0x1}}, {{0x1c, 0x1c, 0x2}}}, 0x108) 14:08:47 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x985b9990b6019721, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x985b9990b6019721, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000200), 0xc) 14:08:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 14:08:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000140)=@in={0x39, 0x2}, 0xa, 0x0, 0x0, 0x0, 0x68}, 0x81) 14:08:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:08:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_buf(r0, 0x0, 0x1, &(0x7f0000000080)="3fe451f643572d395c2f8f4aec3e66574aa53ebc0ea92f1a98b1199b29581875eb89d811091460df22a46b0f4314df8bc4b67836e9d4383ac6fdc301684fd4fbceff12ce2716615ccee1a370173f3ae01e7e9ed87aeeb732d2afbe28a4e81b8847a6d418d779655b76f17c78840df60c489ffdbcef2365ca763ea04c93bc5d043630c2f000e75371b2d51cbac45dd8755ffc83b9de6236a094ce7a5d1e83484d6dd0c5dce83faeb1f4898c1afef94a1ba3484f1ee1a9b6d155074dff037476edb4be865ba0c89d8a840fa217a7d6b37474a18d253c5f4582a0a1979a2a06102a46", 0xe1) 14:08:47 executing program 3: fchmodat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0) 14:08:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x49, &(0x7f0000000000)="d56b8f77a02a82b8bd03e1f5", 0xc) [ 733.191093][ T34] audit: type=1800 audit(1604239727.650:355): pid=3383 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:08:47 executing program 0: fcntl$lock(0xffffffffffffffff, 0x9, &(0x7f0000000040)) 14:08:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {0x0}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a00300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:47 executing program 3: getgroups(0x3, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) getgroups(0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0]) setresgid(r1, 0x0, 0x0) setgid(r0) 14:08:47 executing program 0: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 14:08:47 executing program 3: getgroups(0x3, &(0x7f0000000040)=[0xffffffffffffffff, 0x0, 0x0]) 14:08:47 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockname$inet6(r0, 0x0, &(0x7f00000004c0)) 14:08:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 14:08:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 14:08:48 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x1c, 0x1c, 0x2}, 0x1c) 14:08:48 executing program 0: sendmsg(0xffffffffffffff9c, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)}, 0x0) 14:08:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1008, 0x0, &(0x7f0000000000)) 14:08:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {0x0}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:48 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 734.114073][ T34] audit: type=1800 audit(1604239728.570:356): pid=3430 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16377 res=0 errno=0 14:08:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000140)=0x8c) 14:08:48 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000840000000800000000000000140000008400000001"], 0x24}, 0x0) 14:08:48 executing program 0: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @empty, @val, {@ipv6}}, 0x0) 14:08:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000880)={0xf}, 0xc) 14:08:48 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x20000, 0x0) 14:08:48 executing program 0: open$dir(0x0, 0x2, 0x0) 14:08:49 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x20000, 0x0) 14:08:49 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 14:08:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) getpeername$inet(r0, 0x0, &(0x7f0000000240)) 14:08:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {0x0}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c00300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 734.981413][ T34] audit: type=1800 audit(1604239729.440:357): pid=3474 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:08:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/5, 0x5}], 0x10000000000001fa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000c00)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(r2, 0x1) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r2, 0x0) 14:08:49 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, 0x0, 0x68}, 0x0) 14:08:49 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) listen(r0, 0x0) 14:08:49 executing program 3: setgroups(0x4, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0xffffffffffffffff]) 14:08:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/5, 0x5}], 0x10000000000001fa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000c00)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r2, 0x0) [ 735.803374][ T34] audit: type=1800 audit(1604239730.260:358): pid=3519 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:08:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d00300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:50 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 14:08:50 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 14:08:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0xe, 0x0, 0x0) 14:08:50 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f0000000140)=@in={0x0, 0x2}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1, &(0x7f0000000500)=[@authinfo={0xa}, @prinfo={0x14}], 0x24}, 0x0) 14:08:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/5, 0x5}], 0x10000000000001fa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000c00)=""/4096, 0x1000}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r2, 0x0) 14:08:50 executing program 0: syz_emit_ethernet(0x22, &(0x7f0000000080)={@random="c3eaf4665399", @remote, @val, {@ipv4}}, 0x0) 14:08:50 executing program 0: r0 = socket(0x2, 0x3, 0x0) connect(r0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 14:08:51 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f00000000c0), &(0x7f0000000100)=0x18) 14:08:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00e00300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 736.641262][ T34] audit: type=1800 audit(1604239731.100:359): pid=3546 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:08:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000001340)=[{&(0x7f0000000180)="1f", 0x1}], 0x1, 0x0, 0xc8}, 0x0) 14:08:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 14:08:51 executing program 0: 14:08:51 executing program 0: 14:08:51 executing program 0: 14:08:51 executing program 0: 14:08:51 executing program 3: 14:08:51 executing program 0: 14:08:51 executing program 3: 14:08:51 executing program 0: [ 737.514961][ T34] audit: type=1800 audit(1604239731.970:360): pid=3592 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16358 res=0 errno=0 14:08:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00f00300"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:52 executing program 0: 14:08:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:52 executing program 0: 14:08:52 executing program 3: 14:08:52 executing program 0: 14:08:52 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) 14:08:52 executing program 0: 14:08:52 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) 14:08:52 executing program 0: 14:08:52 executing program 3: 14:08:52 executing program 0: 14:08:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00000400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:52 executing program 3: [ 738.385827][ T34] audit: type=1800 audit(1604239732.840:361): pid=3633 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16324 res=0 errno=0 14:08:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {0x0}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:53 executing program 0: 14:08:53 executing program 3: 14:08:53 executing program 3: 14:08:53 executing program 0: 14:08:53 executing program 0: 14:08:53 executing program 3: 14:08:53 executing program 0: 14:08:53 executing program 3: 14:08:53 executing program 0: 14:08:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:53 executing program 3: [ 739.227572][ T34] audit: type=1800 audit(1604239733.680:362): pid=3656 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16342 res=0 errno=0 14:08:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {0x0}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:53 executing program 0: 14:08:53 executing program 3: 14:08:54 executing program 0: 14:08:54 executing program 3: 14:08:54 executing program 0: 14:08:54 executing program 3: 14:08:54 executing program 0: 14:08:54 executing program 3: 14:08:54 executing program 0: 14:08:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00200400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:54 executing program 3: [ 740.029373][ T34] audit: type=1800 audit(1604239734.490:363): pid=3662 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16342 res=0 errno=0 14:08:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {0x0}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:54 executing program 0: 14:08:54 executing program 3: 14:08:54 executing program 0: 14:08:54 executing program 3: 14:08:55 executing program 0: 14:08:55 executing program 3: 14:08:55 executing program 0: 14:08:55 executing program 3: 14:08:55 executing program 3: [ 740.783153][ T34] audit: type=1800 audit(1604239735.240:364): pid=3682 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16342 res=0 errno=0 14:08:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00300400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:55 executing program 0: 14:08:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:55 executing program 3: 14:08:55 executing program 0: 14:08:55 executing program 0: 14:08:55 executing program 3: 14:08:55 executing program 0: 14:08:55 executing program 3: 14:08:56 executing program 0: 14:08:56 executing program 3: [ 741.523962][ T34] audit: type=1800 audit(1604239735.980:365): pid=3711 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15760 res=0 errno=0 14:08:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00400400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:56 executing program 0: 14:08:56 executing program 3: 14:08:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:56 executing program 0: 14:08:56 executing program 3: 14:08:56 executing program 3: [ 742.167208][ T34] audit: type=1800 audit(1604239736.620:366): pid=3733 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16358 res=0 errno=0 14:08:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00500400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:56 executing program 0: 14:08:56 executing program 3: 14:08:56 executing program 0: 14:08:56 executing program 3: 14:08:56 executing program 0: 14:08:56 executing program 3: 14:08:57 executing program 3: 14:08:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x4, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00600400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:57 executing program 0: 14:08:57 executing program 3: [ 742.960577][ T34] audit: type=1800 audit(1604239737.420:367): pid=3755 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15762 res=0 errno=0 14:08:57 executing program 3: 14:08:57 executing program 0: 14:08:57 executing program 3: 14:08:57 executing program 0: 14:08:57 executing program 3: 14:08:57 executing program 0: 14:08:57 executing program 3: 14:08:57 executing program 0: [ 743.708903][ T34] audit: type=1800 audit(1604239738.170:368): pid=3784 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15762 res=0 errno=0 14:08:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{0x0}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:58 executing program 3: 14:08:58 executing program 0: 14:08:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00700400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:58 executing program 3: 14:08:58 executing program 0: 14:08:58 executing program 3: 14:08:58 executing program 0: 14:08:58 executing program 3: 14:08:58 executing program 0: 14:08:58 executing program 3: 14:08:58 executing program 0: [ 744.583445][ T34] audit: type=1800 audit(1604239739.040:369): pid=3796 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15762 res=0 errno=0 14:08:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{0x0}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:08:59 executing program 0: 14:08:59 executing program 3: 14:08:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00800400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:08:59 executing program 3: 14:08:59 executing program 0: 14:08:59 executing program 3: 14:08:59 executing program 0: 14:08:59 executing program 3: 14:08:59 executing program 0: 14:08:59 executing program 3: 14:08:59 executing program 0: [ 745.406086][ T34] audit: type=1800 audit(1604239739.860:370): pid=3816 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16352 res=0 errno=0 14:09:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{0x0}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:00 executing program 3: 14:09:00 executing program 0: 14:09:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00900400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:00 executing program 0: 14:09:00 executing program 3: 14:09:00 executing program 0: 14:09:00 executing program 3: 14:09:00 executing program 0: 14:09:00 executing program 3: 14:09:00 executing program 0: 14:09:00 executing program 3: [ 746.036267][ T34] audit: type=1800 audit(1604239740.490:371): pid=3839 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16341 res=0 errno=0 14:09:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a00400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:00 executing program 3: 14:09:00 executing program 0: 14:09:00 executing program 3: 14:09:01 executing program 0: 14:09:01 executing program 3: 14:09:01 executing program 0: 14:09:01 executing program 3: 14:09:01 executing program 0: 14:09:01 executing program 3: 14:09:01 executing program 0: [ 747.142922][ T34] audit: type=1800 audit(1604239741.600:372): pid=3873 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16342 res=0 errno=0 14:09:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:01 executing program 3: 14:09:01 executing program 0: 14:09:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:01 executing program 3: 14:09:01 executing program 0: 14:09:01 executing program 3: 14:09:01 executing program 0: 14:09:02 executing program 3: 14:09:02 executing program 0: 14:09:02 executing program 3: r0 = getpgrp(0x0) rt_sigqueueinfo(r0, 0x0, &(0x7f0000002900)={0x0, 0x0, 0xfffffff7}) 14:09:02 executing program 0: r0 = socket$inet(0x2, 0x80803, 0xff) setsockopt$inet_mreqn(r0, 0x0, 0x27, 0x0, 0x0) [ 747.959243][ T34] audit: type=1800 audit(1604239742.420:373): pid=3896 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16384 res=0 errno=0 14:09:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:02 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x1030c1, 0x0) write$ppp(r0, 0x0, 0x0) 14:09:02 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKROGET(r0, 0x4c05, &(0x7f0000000040)) 14:09:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c00400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:02 executing program 3: r0 = socket(0xa, 0x3, 0xd1) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 14:09:02 executing program 0: mq_unlink(&(0x7f0000000040)='\x15\x02\xd0\xc6\x0e@\x18\xe4vV\xff\xff\xe3N\x1c\x89Z\xc7I\xc4\xf6D\x93\xb6\xc4\x80E\x8f\xa6[\xc2N\x05\xe9\xde\xd7\xf3e4h\xe2\xec\xc2E;!\xdf^\xb3:\x9f\x15M@Ow\a\xce\"\x81g\xe2aS\x8f:') 14:09:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x891b, 0x0) 14:09:02 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) accept4(r0, 0x0, 0x0, 0x0) 14:09:02 executing program 3: syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0xffffffffffffffff, 0x4560) 14:09:02 executing program 0: r0 = socket(0x2, 0x3, 0xd1) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000045) 14:09:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newrule={0x2c, 0x20, 0x801, 0x0, 0x0, {0x2, 0x0, 0x14}, [@FRA_FLOW={0x8}, @FRA_SRC={0x7, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x2c}}, 0x0) 14:09:03 executing program 0: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000004180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 748.845681][ T34] audit: type=1800 audit(1604239743.300:374): pid=3926 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16342 res=0 errno=0 14:09:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) close(r0) close(r0) 14:09:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv4_newrule={0x24, 0x20, 0x801, 0x0, 0x0, {}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_PREFIXLEN={0x8}]}, 0x24}}, 0x0) 14:09:03 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d00400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x28, &(0x7f0000000680), 0x4) close(r3) 14:09:03 executing program 3: r0 = socket(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x2, 0x0, &(0x7f0000000000)) 14:09:03 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 14:09:03 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 14:09:04 executing program 3: r0 = add_key$user(&(0x7f0000001b00)='user\x00', &(0x7f0000001b40)={'syz', 0x1}, &(0x7f0000001b80)='M', 0x1, 0xfffffffffffffffc) add_key(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='blacklist\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0) 14:09:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x28, &(0x7f0000000680), 0x4) close(r3) 14:09:04 executing program 3: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) pipe2$9p(&(0x7f00000014c0), 0x0) 14:09:04 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x20801, 0x0) 14:09:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:04 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40202, 0x0) write$apparmor_exec(r0, 0x0, 0x0) [ 749.877231][ T34] audit: type=1800 audit(1604239744.330:375): pid=3962 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00e00400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) setsockopt$sock_int(r3, 0x1, 0x28, &(0x7f0000000680), 0x4) close(r3) 14:09:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 14:09:04 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000001a40)="1aab", 0x2, 0x10, &(0x7f0000001b00)=@nl=@unspec, 0x80) 14:09:04 executing program 3: semget(0x3, 0x0, 0x204) 14:09:04 executing program 0: 14:09:04 executing program 3: 14:09:04 executing program 0: 14:09:04 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x50) 14:09:04 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) 14:09:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:05 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 14:09:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00f00400"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:05 executing program 0: [ 750.790529][ T34] audit: type=1800 audit(1604239745.250:376): pid=4009 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:09:05 executing program 3: 14:09:05 executing program 0: 14:09:05 executing program 3: 14:09:05 executing program 0: 14:09:05 executing program 3: 14:09:05 executing program 0: 14:09:05 executing program 3: 14:09:05 executing program 0: 14:09:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00000500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:06 executing program 3: 14:09:06 executing program 0: [ 751.631786][ T34] audit: type=1800 audit(1604239746.090:377): pid=4044 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16358 res=0 errno=0 14:09:06 executing program 0: 14:09:06 executing program 3: 14:09:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={0x0}}, 0x0) 14:09:06 executing program 3: 14:09:06 executing program 3: 14:09:06 executing program 0: 14:09:06 executing program 3: 14:09:06 executing program 0: [ 752.394990][ T34] audit: type=1800 audit(1604239746.850:378): pid=4061 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16243 res=0 errno=0 14:09:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:07 executing program 3: 14:09:07 executing program 0: 14:09:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:07 executing program 3: 14:09:07 executing program 0: 14:09:07 executing program 3: 14:09:07 executing program 0: 14:09:07 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 14:09:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:09:07 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 14:09:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000180)=[{{&(0x7f00000000c0)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}}, {{0x0, 0x0, 0x0, 0xffffffffffffffe9, &(0x7f0000004800)=ANY=[@ANYRES32], 0x22cc}}], 0x2, 0x0) [ 753.299794][ T34] audit: type=1800 audit(1604239747.760:379): pid=4095 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16340 res=0 errno=0 14:09:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:09:07 executing program 0: mkdirat$cgroup_root(0xffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 14:09:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00200500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:07 executing program 0: 14:09:08 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:09:08 executing program 0: 14:09:08 executing program 3: 14:09:08 executing program 0: 14:09:08 executing program 3: 14:09:08 executing program 0: 14:09:08 executing program 3: [ 754.183688][ T34] audit: type=1800 audit(1604239748.640:380): pid=4135 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16339 res=0 errno=0 14:09:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, 0x0, 0x0, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:08 executing program 0: 14:09:08 executing program 3: 14:09:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00300500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:08 executing program 0: 14:09:08 executing program 3: 14:09:08 executing program 3: 14:09:08 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f000000a700)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000240)="ba", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000100)="b30a0feb8e87ee33f6cbe1128ea64813a653d9e0d67f79319b2e3d89d50dce408bc72fc0a0d93818695a974d97aecdfed87ec5e51f4e6349a44e13903a5ab10e45a647", 0x43}, {&(0x7f0000000180)="9fc9b4149b68c840be4416bdbe17737e28c7825ad3b674b72ac7453e0ab64479e78b3adfd3d8b9fefa051f6f0e576a693c9d58c446135c493ad873d5dc2db4564a1e89f7a017bf56814eeb8bb92a", 0x4e}, {&(0x7f0000000280)="fd656c90f1dc5bc58a9c1e32f48f9fe6f4d0a24a9aecc721ee9504501d720b27389b15d9d5cab19b4c64d639daaf8a36e2a6b0d4985276734c535e3039fac7470fd2ae80b0ed524c27594d4f83059b8aee626ffca6180044e85557f4df8a3488351c2c30db2c661975b1deaa3d61aa93937cd7269e655a1549d5ec242ea15c1612dfb6a021b81c20ddf9f4856cd0841728d1b39a59d5d1a7051b6e1c34f512c73b04f70fdd657e7eb6aa965b642d6953c23b43f7ab53ccf1a56e1e5637dfba014c1e05e413b1d2c7c95def93c9214f9300", 0xd1}, {&(0x7f0000000880)="8c9df5659c69341d0206c8f96bca616c006cbc5bb0a5560f7e301ca17bfe72e21de2b897ad55bb85b2cad4da30c805a3b910c1da2d1621857024bf0ef861dc5463fb30f47a6d84f6a2836a8f00bf23ab136e6bfad8f5578416b78f435bd42405dadc11e3c98b44c7824e65764b24ed5297d97fcc4dfb8c22aa22619b459e1a8cefe9059a2df2ed46302367476d2d7d0ce1448e05d5c9d4b6f88b224165f9cc6f877b24c587a600fc4214a66682d3d02987c6b9abc201a7e9e134a0bb93d04e909c2cdf836dd05a5f661c091e393d34de0462311be81fc5a802a46137104ee963e604b2fdcda2c64c556f63dd097337cebbb53d0fa4b07d0ae5bfceedf717ff1772baf9e56d1c36d06a489a802e2ea9c6fc996b35f06399f5bedb3ee063c661ae04ae39ba332e6b3b2ecc946646ca11021c7894c6dd549c9784016a9e8f44646d6cface05f0ead439f9ef4d8690523492c91b25f839b9773b3b1b6bf6c9df92fb65126870194804afee80f32c9b201b38612416ea569f67727bd99984ff43c40412ed5bceb7d9b5b6d88ef35e01b12f0c694bae8f374c24e2d6cf0a5b17107817f8a8657c9ad919f22904b35add7ad3a13a3816702a5de0daabcd4a890c32a8687bfd3a06ff2131e1e4a87bb08d4151fe7eef7806dcba20dd6401a6f881a93adbf604a619703f14a532362c96533c7fc5904c1e27afab4d04aeff03f659e09ad53315cb86e591d5acab41d5e0ccadb821cf8edad7df62a2a3a0ef60c352e2c8039bce4171505e7fceead0a379e45ad53e14822df065ca8acf68982057a189c2bd56e86a3a35fcaad4763e02b6bc9428771f3fc19763df7e9e5a49824ef3cd79c02fbe80c1616ed77a410315d6c02a4c9368216d1916705882e00b226f2b0e02391a19bcc44011241a3c50b3c94c05e67d15d3c889e4d95f25db989cecbfdd059207994029fdbb43c665405e0a1a3abc8b8663a23e72f25e30a9b8480f2e0280ae7d4c1ce0fc6f256229114396adfa853f42fbca87028b43db034543c14fa8ce40e78389a6f9ca005001cb481426feb51b2084097be345f60c30547892901fac0640b412a5ceafa89018556685ca2a09219cedc18d888c7bb6e14cfc68b11a3e544dae1147a83ac208c0aa0d9a0187c0cc65cce92990160782724b07b4c8cebebb43c680fb932b17e03fcc7529cad8577d7293f80feab3068f93452bfacdbcab9a3218252fb49aafe9e7f5cab07d9d93765a9bf47124fa6395567fe4789c22d95042a1dca14882ab864f747268393c101fb1aee09918dca9a91ca6ee420eb0725378e4d9b873b9125915291f2d3ff46fceae2d927ae375f67ee2d03627eaad35219defd4bc8776a24db09de5e42f4a3ae1d29437737f64e1a13bc29543d971ff972d9ec98261b7411b69f7a444727eb4378c9613c0f21dadd7200c275f249e16aec48500a455fc381f11e4af560c64c0e63f57253d03ae8a545d63de73b87293841fd7f3c0aeb96d5f5f5cfc8aa90219bc44c6b5ee01c918260966a38f443c62b6d10ce65a69a5bb39b99ee25af147944f0761ee2fa7e12fc5df43c2cf0a65ae8b933d1adda1bf5fb1d16826f8a885de7a290cf00592563e50d847b81c9346a02e449b0c45cfa4c94e66faf9c9d37161edd26f92416bd251141f70cc13f1fcfa66081ce81595c3b120e71e5cabd7372892923a7c3c98f2586da2977712fab9b59f8d2eeff4e9baef3782f8a7f75236409d420b08ea2cdff98258d20c10f2328355fa8f597785a37e1df1ef8ce248bfef146af527ae5bc0dd1cb306e363227811bcd1cdbf107c35e412187e16419ae02a9c1267c37396b32ce2d859f3dd588c123e325c3721ac2811b465a1f98b6d3eb1d680e95ff64bf19571a5a21e4b327743003fcd6caeb9021919f2517ac98dfa58833bda88c99f5fb1ec8e323172799d4ed5031a06bdde4f71481a46c88cfa13874b7855cba26a1d7640fdced1d712e6da2b283a53983f545ffefae6e2b9a3541306fb2dc49d5bd6273b996eaec197922da4b4536b266d82b291e0959a96ec49796cf9002bd3c89b53446513182a6782d25aabb76a30d648db3f626d48f4af8d2f0f3a829f14ef4d5046b76771431a2b86823f1fac506cd86649f6cb3a454d02513403db2871542e4c9ac3e0329a92bb1367f844ad9b686e19f246d23323589147bfea6347a38672b4c7e34fa600efcf01c88be6244bea3800dc7fbd3d2228936ee5d36acfb7858dc94d76fbe5d2fd6cd5df74496bc0ad8d0dff6849e791cae7aed097528d5fcb66d9392619b19f67a4a81c083c7eddc6d87fc3d03d883dd63a848e2c29570a6b69a3cfacf9b981ff8d98a6226c15795bd87cd59dfa587bd92ba21ef2dd295562577b68649d7526f6060ae412e2882e421710e0da7cc8a0092ce13505a28212079d4792d4a364a4fc9bd40daa13decd93284d24ad8b0bc0b045fcfb669bbdfc871498b4871b89db3b4fbc73aa47c76fb8b89bb740b03044b57b1959f2d2611722beed85b9c2de2c4147685a50ecf0bd35054f34b9208b09d2bb4da5a27480468ec0dbbc89bde52edc0d30d5eed958315e75aa37bf8a46f8372f6d44d394d1512ae3ba59af8bce3055abe869742ce1545a04aabb3d03dd2d92ed8140d49cf8c7808baac0054cad0a0adba3809d57630994b078f1b83c5b4b809241ba83ccaf1591f3ba571dc31be1cae979b7ea644a03337d1d0970a68426bfb16318908163616af1492278bb468af31d2ce2ec5f8ce2577b716ebadf6703204e8945be9aac278df4039f130bee423e5701e54f0c60616178e562d89d305eb883e64d6275b549ea09694bf27e631ea68a712536ba34fc51e612939b69d42d2f4e56b8a16fe52346e0f33525ef72c8d7e320cdad5df8ce99d550ce1a5359cb75bbb4625a7cc0b959884ab448d24af38ca415f85d0ca5578e6aff3d29d2b294bc0b1c6b578eed477eafbc629e30ce6024beb2ad637fe43d29902cb124e9d11b32a7e0ec449c9e3582a79f6e9c6f9e6fe9a6557a84823860359a7df093396f059b529b8ee3e5fae97c49775c405e3d4a1b825acca0a717994d91d039155be6437439ce4d21b91bd090fdca9404557882939490d862fc4210ef77f0b26c604d1072a2edc3357abe574831b597876c7fcfa8c96a92823c7872000db8d3dc9b49c57dc2e52d0ea617cbcb0547925b911e2fec512a09ba78ef112167de07454bf93d4a49a963035f0f9654cc4e77311190ca343a32689b299d283a57c0ceb1ee8f7bf4b81825702f6fff6be16725727ff8566649c85f76394953e2a7adf7405492fa39889f7c941a082c6b271f8758b3adede4797fc7b31ffea6001a66fc13cf7584dc3d18a57fc59707fc1715e574031512639b0130d8345ad43ad1dc588e2879702b364bf7ef05c9c721105607ae78684c12cc278a673c16585f278137e78757757a89c62d6172f8417c08eb7fc4e48b3bee5ca24279020d76d43bb90797e1830b6f15d565745ac3c29b9938f5ff196a57ec15228a1a98845308c1236dd4e3b7ff61e983ee5f31510966ba65d596f87d14aef67ad09258aa4b49e8", 0x9e6}], 0x4, &(0x7f0000001880)=[{0x1008, 0x0, 0x0, "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"}, {0xa8, 0x0, 0x0, "28378feaf36184ae2f59a3c71edc840840c942796cbe2960b4645985c72fe54690db805ce4590092758ef384408bf24de8035a84d6c485ad2d2c28f630d653075eb940c044022078c2a67a078c3893aa66b22fecb1ae5b4adf3685b4f262e513b31c0e262446c820714e2977744e8eb0735bf64aeb08fa9bdf7a3804d47eced3b390d7b9d7597b4baa9745a446718d1b3132da73239db6d579"}, {0xf40, 0x0, 0x0, "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"}], 0x1ff0}}], 0x3, 0x18080) 14:09:09 executing program 0: unlink(&(0x7f0000000180)='./file0\x00') 14:09:09 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={0x0, @l2tp={0x2, 0x0, @empty}, @hci, @l2tp={0x2, 0x0, @private}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)='veth0_macvtap\x00'}) 14:09:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, 0x0, 0x0, 0x40c0044) 14:09:09 executing program 3: sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, 0x0, 0x0) [ 755.012257][ T34] audit: type=1800 audit(1604239749.470:381): pid=4162 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16308 res=0 errno=0 14:09:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, 0x0, 0x0, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x800) 14:09:09 executing program 3: syz_open_dev$evdev(&(0x7f0000003340)='/dev/input/event#\x00', 0x0, 0x101000) 14:09:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00400500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:09 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x40000) 14:09:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x14) 14:09:09 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) 14:09:09 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000049c0)={'lo\x00', &(0x7f0000004900)=ANY=[@ANYBLOB=' ']}) 14:09:09 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f000000d300)='/dev/zero\x00', 0x0, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r0, 0x0, 0x0) 14:09:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x40) 14:09:10 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, 0x0, 0x0) 14:09:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x40) [ 755.918936][ T34] audit: type=1800 audit(1604239750.380:382): pid=4233 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16274 res=0 errno=0 14:09:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, 0x0, 0x0, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:10 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:09:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x24004000) 14:09:10 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00500500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x4008804) 14:09:10 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) dup3(r1, r0, 0x0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000040)) 14:09:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x44) 14:09:10 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000001c0), 0x4) 14:09:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}}, 0x40001) 14:09:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000001240)={0xfffffffffffffffd, 0x0, &(0x7f0000001200)={0x0}}, 0x4000000) 14:09:10 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x8c0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 14:09:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x840) [ 756.880317][ T34] audit: type=1800 audit(1604239751.340:383): pid=4248 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16377 res=0 errno=0 14:09:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:11 executing program 3: ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) 14:09:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x840) 14:09:11 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00600500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:11 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000010600)='/dev/null\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, 0x0, 0x0) 14:09:11 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg(r0, 0x0, 0x0, 0x400c050) 14:09:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4000000) 14:09:11 executing program 3: open(&(0x7f00000001c0)='./file0\x00', 0x10840, 0xa) 14:09:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xfffffe65, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[], 0x58}}, 0x0) 14:09:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f0000000080)) 14:09:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x20000800) 14:09:11 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) [ 757.670035][ T34] audit: type=1800 audit(1604239752.130:384): pid=4290 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:12 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000004b40)='/dev/vcsa#\x00', 0x323, 0x0) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, 0x0, 0x0) 14:09:12 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 14:09:12 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00700500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:12 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x8c0, 0x0) execve(&(0x7f0000000440)='./file0/file0\x00', 0x0, 0x0) 14:09:12 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:12 executing program 3: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x202001, 0x0) 14:09:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 14:09:12 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 14:09:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000004fc0), 0x4000000000000ec, 0x880) 14:09:12 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 14:09:12 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000004b40)='/dev/vcsa#\x00', 0x323, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x0) [ 758.613503][ T34] audit: type=1800 audit(1604239753.070:385): pid=4332 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16352 res=0 errno=0 14:09:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:13 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x725000, 0x0) 14:09:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x20040800) 14:09:13 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00800500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000fc0)=ANY=[], 0x54}}, 0x40004) 14:09:13 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x404840, 0x0) 14:09:13 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20200, 0x0) 14:09:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r0, 0x0, 0x0, 0x80, 0x0, 0x0) 14:09:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x2000, &(0x7f00000044c0)) 14:09:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={0x0}}, 0x4040000) 14:09:13 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x8c0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 14:09:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40000) [ 759.485026][ T34] audit: type=1800 audit(1604239753.940:386): pid=4374 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16358 res=0 errno=0 14:09:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {0x0}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:14 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) dup3(r1, r0, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000100)={0x0, "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"}) 14:09:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40000) 14:09:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00900500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:14 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000004b40)='/dev/vcsa#\x00', 0x323, 0x0) sendmsg$NLBL_MGMT_C_VERSION(r0, 0x0, 0x0) 14:09:14 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 14:09:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x20004080) 14:09:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x10) 14:09:14 executing program 3: socket(0x2, 0x3, 0x4) 14:09:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x10) 14:09:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:09:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0xc0) [ 760.373177][ T34] audit: type=1800 audit(1604239754.830:387): pid=4422 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16164 res=0 errno=0 14:09:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {0x0}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:09:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x800) 14:09:14 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a00500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:15 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) dup3(r1, r0, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000540)={0x1, 0x0, 0x1a, 0x10, 0x0, 0x0}) 14:09:15 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000140)) 14:09:15 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x200) 14:09:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x4) 14:09:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000049c0)={'lo\x00', &(0x7f0000004900)=ANY=[]}) 14:09:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000078c0)) 14:09:15 executing program 0: syz_open_dev$vcsa(&(0x7f0000010740)='/dev/vcsa#\x00', 0x0, 0x0) 14:09:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x8000) [ 761.286548][ T34] audit: type=1800 audit(1604239755.740:388): pid=4494 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16164 res=0 errno=0 14:09:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {0x0}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x2004c080) 14:09:15 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, 0x0) 14:09:15 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:15 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000002080)='/dev/null\x00', 0x511003, 0x0) 14:09:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x800) 14:09:16 executing program 0: sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, 0x0, 0x57e9e4dade44857a) 14:09:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x24048084) 14:09:16 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x2041, 0x0) lsetxattr$security_evm(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 14:09:16 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 14:09:16 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x8c0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, 0x0) 14:09:16 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0xc0c03) [ 761.958843][ T34] audit: type=1800 audit(1604239756.410:389): pid=4505 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:16 executing program 3: r0 = getpgid(0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 14:09:16 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c00500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20008040) 14:09:16 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000440)) 14:09:16 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x8c0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 14:09:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)) 14:09:17 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x0, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(r0, 0x0, 0x0) 14:09:17 executing program 0: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0xc00, 0x0) 14:09:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={0x0}}, 0x0) 14:09:17 executing program 0: r0 = getpgid(0x0) ptrace$setopts(0x4206, r0, 0x1b1, 0x0) 14:09:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0}}, 0x20000000) [ 762.967021][ T34] audit: type=1800 audit(1604239757.420:390): pid=4543 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:09:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:17 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000004b40)='/dev/vcsa#\x00', 0x323, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) 14:09:17 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:17 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d00500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:17 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000023940), 0x0, 0x0, &(0x7f0000023b40)={0x0, 0x3938700}) 14:09:17 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x1019c0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[], 0x1df, 0x0) 14:09:17 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x1019c0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[], 0x1df, 0x0) 14:09:17 executing program 0: pipe2$9p(&(0x7f0000000440), 0x80800) 14:09:18 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000001340), 0x0, 0x0) 14:09:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={0x0}}, 0x40044804) 14:09:18 executing program 0: sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) 14:09:18 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) write$cgroup_freezer_state(r0, 0x0, 0x0) [ 763.829676][ T34] audit: type=1800 audit(1604239758.290:391): pid=4580 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16340 res=0 errno=0 14:09:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:18 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00e00500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:18 executing program 3: ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) 14:09:18 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x3, 0x0) 14:09:18 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 14:09:18 executing program 0: 14:09:18 executing program 3: 14:09:18 executing program 3: 14:09:18 executing program 0: 14:09:18 executing program 3: mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5000006, 0xa0832, 0xffffffffffffffff, 0x0) 14:09:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000100)={'filter\x00'}, 0xfffffce7) 14:09:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup(r0) [ 764.791966][ T34] audit: type=1800 audit(1604239759.250:392): pid=4606 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16348 res=0 errno=0 14:09:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {0x0}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:19 executing program 3: 14:09:19 executing program 0: 14:09:19 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00f00500"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:19 executing program 0: 14:09:19 executing program 3: 14:09:19 executing program 3: 14:09:19 executing program 0: 14:09:19 executing program 3: 14:09:19 executing program 0: 14:09:19 executing program 3: 14:09:19 executing program 0: [ 765.640585][ T34] audit: type=1800 audit(1604239760.100:393): pid=4650 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16348 res=0 errno=0 14:09:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {0x0}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:20 executing program 3: 14:09:20 executing program 0: 14:09:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00000600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:20 executing program 3: 14:09:20 executing program 0: 14:09:20 executing program 3: 14:09:20 executing program 0: 14:09:20 executing program 3: 14:09:20 executing program 0: 14:09:20 executing program 0: 14:09:20 executing program 3: [ 766.462478][ T34] audit: type=1800 audit(1604239760.920:394): pid=4675 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16342 res=0 errno=0 14:09:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {0x0}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:21 executing program 3: 14:09:21 executing program 0: 14:09:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:21 executing program 3: 14:09:21 executing program 0: 14:09:21 executing program 3: 14:09:21 executing program 0: 14:09:21 executing program 3: 14:09:21 executing program 0: 14:09:21 executing program 3: 14:09:21 executing program 0: [ 767.284179][ T34] audit: type=1800 audit(1604239761.740:395): pid=4701 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16342 res=0 errno=0 14:09:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:21 executing program 3: 14:09:21 executing program 0: 14:09:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00200600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:22 executing program 0: 14:09:22 executing program 3: 14:09:22 executing program 0: 14:09:22 executing program 3: 14:09:22 executing program 0: 14:09:22 executing program 0: 14:09:22 executing program 3: 14:09:22 executing program 0: [ 768.067307][ T34] audit: type=1800 audit(1604239762.520:396): pid=4726 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:22 executing program 3: 14:09:22 executing program 0: 14:09:22 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00300600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:22 executing program 3: 14:09:22 executing program 0: 14:09:22 executing program 3: 14:09:23 executing program 0: 14:09:23 executing program 3: 14:09:23 executing program 0: 14:09:23 executing program 0: 14:09:23 executing program 3: [ 769.061270][ T34] audit: type=1800 audit(1604239763.520:397): pid=4737 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:23 executing program 0: 14:09:23 executing program 3: 14:09:23 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00400600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:23 executing program 0: 14:09:23 executing program 3: 14:09:23 executing program 0: 14:09:23 executing program 3: 14:09:24 executing program 0: 14:09:24 executing program 3: 14:09:24 executing program 0: 14:09:24 executing program 3: [ 769.945343][ T34] audit: type=1800 audit(1604239764.400:398): pid=4762 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:09:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {0x0}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:24 executing program 0: 14:09:24 executing program 3: 14:09:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00500600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:24 executing program 0: 14:09:24 executing program 3: 14:09:24 executing program 0: 14:09:24 executing program 3: 14:09:24 executing program 0: 14:09:24 executing program 3: 14:09:24 executing program 0: 14:09:25 executing program 3: [ 770.862062][ T34] audit: type=1800 audit(1604239765.320:399): pid=4786 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {0x0}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00600600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:25 executing program 0: 14:09:25 executing program 3: 14:09:25 executing program 3: 14:09:25 executing program 0: 14:09:25 executing program 3: 14:09:25 executing program 0: 14:09:25 executing program 3: 14:09:25 executing program 0: 14:09:25 executing program 3: 14:09:25 executing program 0: [ 771.800458][ T34] audit: type=1800 audit(1604239766.260:400): pid=4813 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {0x0}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:26 executing program 3: 14:09:26 executing program 0: 14:09:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00700600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:26 executing program 0: 14:09:26 executing program 3: 14:09:26 executing program 3: 14:09:26 executing program 0: 14:09:26 executing program 3: 14:09:26 executing program 0: 14:09:26 executing program 3: 14:09:26 executing program 0: [ 772.635897][ T34] audit: type=1800 audit(1604239767.090:401): pid=4848 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16368 res=0 errno=0 14:09:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:27 executing program 3: 14:09:27 executing program 0: 14:09:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00800600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:27 executing program 3: 14:09:27 executing program 0: 14:09:27 executing program 3: 14:09:27 executing program 0: 14:09:27 executing program 3: 14:09:27 executing program 0: 14:09:27 executing program 3: 14:09:27 executing program 0: [ 773.467624][ T34] audit: type=1800 audit(1604239767.920:402): pid=4871 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16377 res=0 errno=0 14:09:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:28 executing program 3: 14:09:28 executing program 0: 14:09:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00900600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:28 executing program 3: 14:09:28 executing program 0: 14:09:28 executing program 3: 14:09:28 executing program 0: 14:09:28 executing program 3: 14:09:28 executing program 0: 14:09:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x17, &(0x7f0000000080), 0x4) 14:09:28 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) [ 774.286988][ T34] audit: type=1800 audit(1604239768.740:403): pid=4898 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16342 res=0 errno=0 14:09:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, 0x0, &(0x7f0000000080)) 14:09:28 executing program 3: perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:09:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a00600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:29 executing program 0: getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f00000004c0)) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 14:09:29 executing program 3: perf_event_open$cgroup(&(0x7f0000000900)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 14:09:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {0x0}, {&(0x7f0000000340)="ac", 0x1}], 0x3}, 0x0) 14:09:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@rights={{0x10}}], 0x10}, 0x0) 14:09:29 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000047c0)='/dev/vcsa\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000180)={{}, {}, [{0x2, 0x0, 0xee01}], {}, [{}]}, 0x34, 0x0) 14:09:29 executing program 3: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6) 14:09:29 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getgroups(0x0, 0x0) syz_read_part_table(0x800, 0x3, &(0x7f0000002b80)=[{&(0x7f0000000900), 0x0, 0xe368}, {0x0}, {0x0}]) 14:09:29 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) getpid() getgroups(0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 775.274360][ T34] audit: type=1800 audit(1604239769.730:404): pid=4930 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {0x0}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x4, &(0x7f0000000080)=0x1, 0x4) 14:09:29 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) getpid() getgroups(0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 14:09:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000280)='-', 0x1}], 0x2, &(0x7f00000005c0)=[{0x10}], 0x10}, 0x0) 14:09:30 executing program 3: syz_open_dev$sg(0x0, 0x0, 0x0) getpid() getgroups(0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 14:09:30 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') 14:09:30 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000003740)='./file0\x00', 0x8164afce45166065, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 14:09:30 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x4}}, 0x24, 0x0) 14:09:30 executing program 0: 14:09:30 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x4}}, 0x24, 0x0) 14:09:30 executing program 0: [ 776.078413][ T34] audit: type=1800 audit(1604239770.530:405): pid=4970 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {0x0}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:30 executing program 3: 14:09:30 executing program 0: 14:09:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c00600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:30 executing program 3: 14:09:30 executing program 0: 14:09:30 executing program 3: 14:09:30 executing program 0: 14:09:30 executing program 3: 14:09:31 executing program 0: 14:09:31 executing program 3: 14:09:31 executing program 3: [ 777.042974][ T34] audit: type=1800 audit(1604239771.500:406): pid=5019 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16340 res=0 errno=0 14:09:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {0x0}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x15, &(0x7f0000000080), 0x4) 14:09:31 executing program 3: 14:09:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d00600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:31 executing program 3: 14:09:31 executing program 0: 14:09:31 executing program 0: 14:09:31 executing program 3: 14:09:32 executing program 3: 14:09:32 executing program 0: 14:09:32 executing program 0: 14:09:32 executing program 3: [ 777.928336][ T34] audit: type=1800 audit(1604239772.380:407): pid=5030 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:32 executing program 3: 14:09:32 executing program 0: 14:09:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00e00600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:32 executing program 0: 14:09:32 executing program 3: 14:09:32 executing program 3: 14:09:32 executing program 0: 14:09:32 executing program 0: 14:09:32 executing program 3: 14:09:32 executing program 3: getgroups(0x1, &(0x7f0000000040)=[0x0]) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 14:09:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) [ 778.773162][ T34] audit: type=1800 audit(1604239773.230:408): pid=5055 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:33 executing program 0: socketpair(0x6, 0x0, 0x2, 0x0) 14:09:33 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000100)={@empty, @local, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @broadcast, "a9e94b2e748d7378dc5a4daa61e6607e"}}}}, 0x0) 14:09:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00f00600"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:33 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') utimensat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x2) 14:09:33 executing program 3: mlock(&(0x7f0000002000/0x3000)=nil, 0x3000) madvise(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x6) 14:09:33 executing program 0: 14:09:33 executing program 3: 14:09:33 executing program 0: 14:09:33 executing program 3: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 14:09:33 executing program 3: r0 = semget(0x1, 0x0, 0x404) semctl$IPC_RMID(r0, 0x0, 0x0) 14:09:33 executing program 0: mprotect(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4) [ 779.733024][ T34] audit: type=1800 audit(1604239774.190:409): pid=5086 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:09:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x4, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:34 executing program 0: 14:09:34 executing program 3: 14:09:34 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00\x00\a\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:34 executing program 3: 14:09:34 executing program 0: 14:09:34 executing program 3: 14:09:34 executing program 0: 14:09:34 executing program 3: 14:09:34 executing program 0: 14:09:34 executing program 3: 14:09:34 executing program 0: [ 780.590334][ T34] audit: type=1800 audit(1604239775.040:410): pid=5117 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16373 res=0 errno=0 14:09:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{0x0}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:35 executing program 3: 14:09:35 executing program 0: 14:09:35 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000013c0)={'sit0\x00', &(0x7f0000001340)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty}}) 14:09:35 executing program 0: socketpair(0x25, 0x3, 0x400008, &(0x7f0000000040)) 14:09:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x40) 14:09:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f00000001c0), 0x4) 14:09:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x2}]}}, &(0x7f0000000040)=""/171, 0x2a, 0xab, 0x1}, 0x20) 14:09:35 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4c}}) [ 781.438038][ T34] audit: type=1800 audit(1604239775.890:411): pid=5139 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16348 res=0 errno=0 14:09:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{0x0}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'bridge_slave_1\x00', &(0x7f0000000280)=@ethtool_flash={0x33, 0x0, './file0\x00'}}) 14:09:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x1, &(0x7f0000000140)=@raw=[@exit={0x95, 0x2}], &(0x7f0000000180)='GPL\x00', 0x3, 0xe4, &(0x7f00000001c0)=""/228, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00 \a\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x1, &(0x7f0000000140)=@raw=[@exit={0x95, 0x2}], &(0x7f0000000180)='GPL\x00', 0x3, 0xe4, &(0x7f00000001c0)=""/228, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xd, 0x1}]}]}}, &(0x7f0000000280)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 14:09:36 executing program 3: syz_emit_ethernet(0x12, &(0x7f0000000000)={@multicast, @remote, @val={@void, {0x4305}}}, 0x0) 14:09:36 executing program 0: 14:09:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0xce, &(0x7f0000000100)=""/206, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x1, &(0x7f0000000140)=@raw=[@exit={0x95, 0x0, 0x0, 0x48}], &(0x7f0000000180)='GPL\x00', 0x3, 0xe4, &(0x7f00000001c0)=""/228, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:36 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000000)=@ethtool_link_settings={0x47}}) [ 782.347612][ T34] audit: type=1800 audit(1604239776.800:412): pid=5176 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16348 res=0 errno=0 14:09:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{0x0}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x8931, &(0x7f0000000400)={'sit0\x00', 0x0}) 14:09:36 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 14:09:36 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x000\a\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x40049409, 0x0) 14:09:37 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x14, 0x14, 0x1, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 14:09:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x8911, &(0x7f0000000400)={'sit0\x00', 0x0}) 14:09:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0xd, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 14:09:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x6, 0x6, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 14:09:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x1, &(0x7f0000000140)=@raw=[@exit], &(0x7f0000000180)='GPL\x00', 0x3, 0xe4, &(0x7f00000001c0)=""/228, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x1, &(0x7f0000000140)=@raw=[@exit], &(0x7f0000000180)='GPL\x00', 0x3, 0xe4, &(0x7f00000001c0)=""/228, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0x6, 0x6, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) [ 783.270766][ T34] audit: type=1800 audit(1604239777.730:413): pid=5233 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:37 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x28, 0x14, 0x1, 0x0, 0x0, {0x1}, [@INET_DIAG_REQ_BYTECODE={0x11, 0x1, "93d73c099da37bc4e13e8122b2"}]}, 0x28}}, 0x0) 14:09:37 executing program 3: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 14:09:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00@\a\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x1, &(0x7f0000000140)=@raw=[@exit], &(0x7f0000000180)='GPL\x00', 0x3, 0xe4, &(0x7f00000001c0)=""/228, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:37 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x28, 0x14, 0x1, 0x0, 0x0, {0x1}, [@INET_DIAG_REQ_BYTECODE={0x11, 0x1, "93d73c099da37bc4e13e8122b2"}]}, 0x28}}, 0x0) 14:09:38 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x40010003, 0x0, 0x0) 14:09:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/171, 0x1a, 0xab, 0x1}, 0x20) 14:09:38 executing program 3: 14:09:38 executing program 0: 14:09:38 executing program 3: 14:09:38 executing program 0: [ 784.137564][ T34] audit: type=1800 audit(1604239778.590:414): pid=5249 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16340 res=0 errno=0 14:09:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:38 executing program 3: 14:09:38 executing program 0: 14:09:38 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00P\a\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:38 executing program 3: 14:09:38 executing program 0: 14:09:38 executing program 3: 14:09:38 executing program 0: 14:09:38 executing program 3: 14:09:38 executing program 3: 14:09:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xd}]}]}}, &(0x7f0000000280)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 14:09:39 executing program 3: [ 784.952449][ T34] audit: type=1800 audit(1604239779.410:415): pid=5276 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15841 res=0 errno=0 14:09:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:39 executing program 0: 14:09:39 executing program 3: 14:09:39 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00`\a\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:39 executing program 3: 14:09:39 executing program 0: 14:09:39 executing program 0: 14:09:39 executing program 3: 14:09:39 executing program 3: 14:09:39 executing program 0: 14:09:39 executing program 3: 14:09:39 executing program 0: [ 785.791539][ T34] audit: type=1800 audit(1604239780.250:416): pid=5299 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16017 res=0 errno=0 14:09:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:40 executing program 3: 14:09:40 executing program 0: 14:09:40 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00p\a\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:40 executing program 3: 14:09:40 executing program 0: 14:09:40 executing program 0: 14:09:40 executing program 3: 14:09:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x30040, 0x0) 14:09:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x2bed40, 0x0) 14:09:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x16940, 0x1944789b47eff943) 14:09:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x30240, 0x121) [ 786.699074][ T34] audit: type=1800 audit(1604239781.160:417): pid=5322 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16113 res=0 errno=0 14:09:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x10140, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x800, 0x60) 14:09:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x30040, 0x1a4) 14:09:41 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00800700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file1\x00', 0xf0040, 0x79) 14:09:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x16940, 0x1944789b47eff96b) 14:09:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x38040, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x20, &(0x7f0000000200)) 14:09:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x38040, 0x0) statx(r0, &(0x7f0000000040)='./file0\x00', 0x4000, 0x8, &(0x7f00000000c0)) 14:09:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x38040, 0x0) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x400, &(0x7f0000000200)) 14:09:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x416940, 0x1944789b47eff96b) 14:09:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000002d80), 0x400018a, 0x0) 14:09:41 executing program 3: socketpair(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 787.547401][ T34] audit: type=1800 audit(1604239782.000:418): pid=5354 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16227 res=0 errno=0 14:09:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x6, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) write$P9_RSETATTR(r2, 0x0, 0x0) 14:09:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00900700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:42 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x60241, 0x0) write$P9_RLINK(r0, 0x0, 0x0) 14:09:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) 14:09:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) write$cgroup_devices(r2, 0x0, 0x0) 14:09:42 executing program 3: 14:09:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000002d80), 0x400018a, 0x0) 14:09:42 executing program 3: 14:09:42 executing program 3: 14:09:42 executing program 3: 14:09:42 executing program 3: 14:09:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:43 executing program 3: 14:09:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a00700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 788.581424][ T34] audit: type=1800 audit(1604239783.040:419): pid=5392 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16322 res=0 errno=0 14:09:43 executing program 3: 14:09:43 executing program 3: 14:09:43 executing program 3: 14:09:43 executing program 3: 14:09:43 executing program 0: 14:09:43 executing program 3: 14:09:43 executing program 0: 14:09:43 executing program 3: 14:09:43 executing program 3: [ 789.443718][ T34] audit: type=1800 audit(1604239783.900:420): pid=5424 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16162 res=0 errno=0 14:09:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:43 executing program 0: 14:09:43 executing program 3: 14:09:43 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:44 executing program 0: 14:09:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001780)=[{&(0x7f00000000c0)='X', 0x1}], 0x1, &(0x7f0000000180)=[@init={0x14, 0x84, 0x1, {0x8df, 0x0, 0x0, 0x8}}], 0x14}, 0x0) 14:09:44 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect(r1, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f00000001c0), 0xc) 14:09:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000980)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000900)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x1200}}], 0x1c}, 0x0) 14:09:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000300)=@in={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@in={0x10, 0x2}, 0x10) 14:09:44 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) connect(r1, &(0x7f0000000180)=@in6={0x1c, 0x1c}, 0x1c) 14:09:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 14:09:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect(r1, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x10) [ 790.304240][ T34] audit: type=1800 audit(1604239784.760:421): pid=5453 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16377 res=0 errno=0 14:09:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:44 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x3, 0x84) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0x0}}, 0x14) setsockopt$inet6_buf(r0, 0x29, 0x19, 0x0, 0x0) 14:09:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000140), 0x8) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)="2a48b1fe507272165e58d6f083d1a21c3215c25f6a21874602", 0x19}], 0x1}, 0x0) 14:09:44 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c00700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect(r1, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x10000000}, 0x10) 14:09:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect(r1, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x20000, 0x10000000, 0x3}, 0x10) 14:09:45 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, 0x0, 0x0) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000700)="ee5b16b2c31d92d4fd334ad77cba02a4408bf8ed2f3210ecc321426c54e5293c52abbf7469cd466d01142aa7ef9dd047d0b2d1aba6dcd4f756ac788087076111535acd16c81e652c25a937a5be9929477b591377c9c30a4c4e4f2dc80ff39f16b3c62419a6ef6beeb49620e54eae7550ec24210cc29ccf7f9f6ae229", 0x7c}, {&(0x7f00000005c0)="2a48b1fe507272165e58d6f083d1a21c3215c25f6a218746029dbe774984c1176922186dd71a3ee0fe4a538d14abebda6033eefb0667488b200b6bd9db6fb98f5836ffa2e78a0661abc43c0350ffd2d0e22d5022adf50de814b343cfaa552d54b4658485b92d4ed098d229617a3014576c", 0x71}, {&(0x7f0000000400)="100bda8da93bfbae1986daad10c7e5e81c14e9a930d808dbfba660b09b6f7d45377e69e393b99fc61009c013188fcc407fba0d7f73ef84", 0x37}], 0x3}, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000240)}, {&(0x7f0000000040)="5bcd5af3fdd16556e8f229342ad897fcdc8aae8c61dccdd0c24d00000000000000000000000000000021b0fccd97dc7a5386613b5f94f3d3bf10169c62f451ef8789bf8ab37fbba5a18f9555bde5f90e7afe830513d5cec3ca3f587ba8dc4f228b115f7ffeef0f536e836f4350222b594f088bee3d493c11a19bac408880498d8bd20d4b99f330ed0f4eac57ddf6027eb706664b02", 0x95}, {&(0x7f0000000900)="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", 0x4bb}], 0x3}, 0x0) 14:09:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect(r1, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0xfffdffff}, 0x10) 14:09:45 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 14:09:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x903, &(0x7f0000000340), 0x8) 14:09:45 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x3, 0x84) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) connect(r1, &(0x7f0000000180)=@in6={0x1c, 0x1c}, 0x1c) 14:09:45 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000040), 0x8c) 14:09:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00') 14:09:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') [ 791.259050][ T34] audit: type=1800 audit(1604239785.720:422): pid=5498 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16380 res=0 errno=0 14:09:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d00700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:45 executing program 3: setuid(0xffffffffffffffff) setresuid(0xffffffffffffffff, 0x0, 0x0) 14:09:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') 14:09:45 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) connect(r0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 14:09:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 14:09:46 executing program 3: syz_emit_ethernet(0x3a, &(0x7f0000000140)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 14:09:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 14:09:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect(r1, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) r2 = dup(r0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x900, &(0x7f0000000100), &(0x7f0000000140)=0x8) 14:09:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000140), 0x8) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0xfffffffffffffd91, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000005c0)="2a48b1fe507272165e58d6f083d1a21c32", 0x11}], 0x1}, 0x0) 14:09:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect(r1, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000280), &(0x7f0000000300)=0x8) 14:09:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180), 0x80) [ 792.173317][ T34] audit: type=1800 audit(1604239786.630:423): pid=5565 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16358 res=0 errno=0 14:09:46 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00e00700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind(r0, &(0x7f00000003c0)=@in={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@in={0x10, 0x2}, 0x10) 14:09:46 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f0000000480), 0x4) 14:09:46 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r1, r0) r2 = fcntl$dupfd(r0, 0x0, r1) read(r2, &(0x7f0000000080)=""/35, 0x23) 14:09:46 executing program 3: 14:09:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@prinfo={0x14, 0x84, 0x7, {0x1}}], 0x14}, 0x0) 14:09:46 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) readlink(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x4, 0x0) 14:09:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect(r1, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8001}, 0x10) 14:09:47 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000004c0)="e6", 0x1}], 0x1, &(0x7f0000000200)=[{0xc}], 0xc}, 0x0) [ 792.855398][ T34] audit: type=1800 audit(1604239787.310:424): pid=5586 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16162 res=0 errno=0 14:09:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x9, &(0x7f0000001100)={@loopback, @remote={0xac, 0x14, 0x0}}, 0x8) 14:09:47 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00f00700"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:47 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x1c, 0x1c, 0x1}, 0x1c) 14:09:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000480)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000200)="c0", 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000000), &(0x7f00000000c0)=0xb8) 14:09:47 executing program 3: setuid(0xffffffffffffffff) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x23, &(0x7f0000000180)=ANY=[], 0x20) 14:09:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind(r0, &(0x7f00000003c0)=@in={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 14:09:47 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000140)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 14:09:48 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 14:09:48 executing program 0: 14:09:48 executing program 0: 14:09:48 executing program 0: [ 793.766570][ T34] audit: type=1800 audit(1604239788.220:425): pid=5644 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15937 res=0 errno=0 14:09:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {0x0}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:48 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00\x00\b\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:48 executing program 0: 14:09:48 executing program 0: 14:09:48 executing program 0: 14:09:48 executing program 0: 14:09:48 executing program 0: 14:09:48 executing program 0: 14:09:48 executing program 3: 14:09:48 executing program 0: 14:09:48 executing program 3: 14:09:49 executing program 0: [ 794.624906][ T34] audit: type=1800 audit(1604239789.080:426): pid=5652 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16377 res=0 errno=0 14:09:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {0x0}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:49 executing program 3: 14:09:49 executing program 0: 14:09:49 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:49 executing program 3: 14:09:49 executing program 0: 14:09:49 executing program 3: 14:09:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000040)=[{r0, 0x2}, {r0, 0x2}], 0x2, 0xffff) connect(r0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 14:09:49 executing program 3: 14:09:49 executing program 3: 14:09:49 executing program 3: 14:09:49 executing program 3: [ 795.576207][ T34] audit: type=1800 audit(1604239790.030:427): pid=5681 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15771 res=0 errno=0 14:09:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {0x0}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:50 executing program 3: 14:09:50 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00 \b\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:50 executing program 3: 14:09:50 executing program 3: 14:09:50 executing program 0: 14:09:50 executing program 3: 14:09:50 executing program 0: 14:09:50 executing program 3: 14:09:50 executing program 0: 14:09:50 executing program 3: pwritev(0xffffffffffffffff, &(0x7f00000006c0)=[{0x0}], 0x1, 0x0, 0x0) 14:09:50 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x8, 0x800) msgrcv(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff00"/153], 0x99, 0x1, 0x1000) msgrcv(r0, &(0x7f0000000040)={0x0, ""/95}, 0x67, 0x0, 0x1000) 14:09:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:51 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt(r0, 0x0, 0x0, &(0x7f0000000000)="e4360b36c4de5d8da0d4d0d99bf3c49c25b7c307c4e3be0165e17fd8cf2379b5ab2c15af6f9c1a23201b2f7650eafcd384df02f498e3a0fe15bb88dbcf3ff7d7a27ca57936984f11f0899c168551cd06dd3d6407f7285dd0b0152c0e972d40ed34012ce7826022420417e1cba36a7127bf4889585309a3ff372ec8a387f7563a9068c3b8520320192705431394c1a945cd0c3f1eacbf6283d6f39cb34120afaf3aaba38121923a4ca1da0d9e2c23594dc6526e774a8b31eecaa6c9fee639018aac17805d7f8233a8785135eb5a096fd8cf796fb0b3fd5197d6ed6abc72f4afddba", 0xe1) [ 796.521142][ T34] audit: type=1800 audit(1604239790.980:428): pid=5710 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16358 res=0 errno=0 14:09:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x000\b\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:51 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, &(0x7f00000017c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001800)) 14:09:51 executing program 3: nanosleep(&(0x7f00000000c0), 0x0) clock_getres(0x4, &(0x7f0000000080)) 14:09:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0x350}, 0x0) 14:09:51 executing program 3: r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f00000000c0)=[{0x0, 0x90}, {0x0, 0x101}], 0x2) 14:09:51 executing program 3: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) 14:09:51 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000300)=ANY=[@ANYRES32], 0x8, 0x800) msgrcv(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff00"/153], 0x99, 0x1, 0x1000) msgrcv(r0, &(0x7f0000000040)={0x0, ""/95}, 0x67, 0x0, 0x1000) 14:09:51 executing program 3: r0 = semget(0x2, 0x0, 0x0) semctl$GETPID(r0, 0x4, 0x4, 0x0) 14:09:51 executing program 3: poll(&(0x7f0000000180)=[{0xffffffffffffff9c}, {0xffffffffffffff9c}, {0xffffffffffffff9c}], 0x3, 0x0) 14:09:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00@\b\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 797.369719][ T34] audit: type=1800 audit(1604239791.830:429): pid=5762 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:09:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:51 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 14:09:52 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f0000000080)={{0x18, 0x1}, {0x18, 0x3}}, 0x3c) 14:09:52 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) dup2(r0, r0) 14:09:52 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)}, 0x0) 14:09:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:09:52 executing program 3: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setown(r0, 0x6, 0x0) 14:09:52 executing program 0: socketpair(0x1, 0x0, 0x1, 0x0) 14:09:52 executing program 0: 14:09:52 executing program 3: 14:09:52 executing program 0: 14:09:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00P\b\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 798.208571][ T34] audit: type=1800 audit(1604239792.660:430): pid=5771 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:09:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:52 executing program 3: 14:09:52 executing program 0: 14:09:52 executing program 3: 14:09:52 executing program 0: 14:09:52 executing program 3: 14:09:53 executing program 0: 14:09:53 executing program 3: 14:09:53 executing program 0: 14:09:53 executing program 3: 14:09:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)='s', 0x1}], 0x1}, 0x0) 14:09:53 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00`\b\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 799.083887][ T34] audit: type=1800 audit(1604239793.540:431): pid=5806 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16341 res=0 errno=0 14:09:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {0x0}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:53 executing program 3: 14:09:53 executing program 0: 14:09:53 executing program 3: 14:09:53 executing program 0: 14:09:53 executing program 3: 14:09:53 executing program 0: 14:09:53 executing program 3: 14:09:54 executing program 3: 14:09:54 executing program 0: 14:09:54 executing program 3: [ 799.897329][ T34] audit: type=1800 audit(1604239794.350:432): pid=5848 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16341 res=0 errno=0 14:09:54 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00p\b\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {0x0}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:54 executing program 0: 14:09:54 executing program 3: 14:09:54 executing program 3: 14:09:54 executing program 0: 14:09:54 executing program 3: 14:09:54 executing program 0: 14:09:54 executing program 3: 14:09:54 executing program 0: 14:09:54 executing program 3: 14:09:55 executing program 0: [ 800.742365][ T34] audit: type=1800 audit(1604239795.200:433): pid=5871 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16341 res=0 errno=0 14:09:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00800800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {0x0}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:55 executing program 3: 14:09:55 executing program 0: 14:09:55 executing program 0: 14:09:55 executing program 3: 14:09:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x1}]}]}}, &(0x7f0000000300)=""/226, 0x32, 0xe2, 0x1}, 0x20) 14:09:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003f40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 14:09:55 executing program 0: socketpair(0x22, 0x0, 0x4, &(0x7f0000000140)) 14:09:55 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x10000, 0x0) 14:09:55 executing program 0: 14:09:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x7ffff, &(0x7f0000000040)=@raw=[@btf_id], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000000c0)=""/191, 0x0, 0x12, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 14:09:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00900800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 801.572914][ T34] audit: type=1800 audit(1604239796.030:434): pid=5876 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16260 res=0 errno=0 14:09:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:56 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000b80)={0x0, 0x0, 0x0}, 0x0) 14:09:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000400)=""/155, 0x46, 0x9b, 0x1}, 0x20) 14:09:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xc, 0x5}, {0xf}, {0xd, 0x2}]}]}}, &(0x7f0000000240)=""/245, 0x3e, 0xf5, 0x1}, 0x20) 14:09:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000180)=@framed={{}, [@jmp, @jmp, @btf_id, @func, @alu, @func, @alu, @btf_id]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xbf, &(0x7f00000000c0)=""/191, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb1) 14:09:56 executing program 3: bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) 14:09:56 executing program 0: 14:09:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003f40)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000011d80)={0x0, 0x0, &(0x7f0000011c40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x1) 14:09:56 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000006c0)) 14:09:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf}, {0xd, 0x2}]}, @restrict]}}, &(0x7f0000000240)=""/245, 0x42, 0xf5, 0x1}, 0x20) 14:09:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @restrict]}}, &(0x7f0000000240)=""/245, 0x3a, 0xf5, 0x1}, 0x20) 14:09:56 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00a00800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 802.481920][ T34] audit: type=1800 audit(1604239796.940:435): pid=5932 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16257 res=0 errno=0 14:09:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) 14:09:57 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f00000007c0)='ns/time\x00') 14:09:57 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000b80)={&(0x7f0000000700)=@nfc, 0x80, 0x0}, 0x0) 14:09:57 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 14:09:57 executing program 0: bpf$PROG_BIND_MAP(0xc, 0x0, 0x0) 14:09:57 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x490002, 0x0) 14:09:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 14:09:57 executing program 0: socketpair(0xa, 0x3, 0x7, &(0x7f0000000000)) 14:09:57 executing program 3: rmdir(0x0) 14:09:57 executing program 0: socketpair(0xa, 0x3, 0x7, &(0x7f0000000000)) [ 803.359079][ T34] audit: type=1800 audit(1604239797.820:436): pid=5939 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:09:57 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:58 executing program 3: read(0xffffffffffffffff, &(0x7f0000000380)=""/4096, 0x1000) 14:09:58 executing program 0: lstat(&(0x7f0000001280)='./file0\x00', 0x0) 14:09:58 executing program 3: nanosleep(&(0x7f00000001c0), 0x0) 14:09:58 executing program 0: readlink(&(0x7f00000003c0)='./file0/file0\x00', 0xfffffffffffffffe, 0x0) 14:09:58 executing program 3: 14:09:58 executing program 0: 14:09:58 executing program 3: 14:09:58 executing program 0: 14:09:58 executing program 3: 14:09:58 executing program 0: [ 804.260451][ T34] audit: type=1800 audit(1604239798.720:437): pid=5975 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16260 res=0 errno=0 14:09:58 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00c00800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {0x0}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:59 executing program 3: 14:09:59 executing program 0: 14:09:59 executing program 3: 14:09:59 executing program 0: 14:09:59 executing program 3: 14:09:59 executing program 0: 14:09:59 executing program 3: 14:09:59 executing program 0: 14:09:59 executing program 3: 14:09:59 executing program 0: [ 805.086074][ T34] audit: type=1800 audit(1604239799.540:438): pid=6002 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16260 res=0 errno=0 14:09:59 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00d00800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:09:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {0x0}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:09:59 executing program 3: 14:09:59 executing program 0: 14:10:00 executing program 3: 14:10:00 executing program 0: 14:10:00 executing program 0: 14:10:00 executing program 3: 14:10:00 executing program 0: 14:10:00 executing program 3: 14:10:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00e00800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 805.729804][ T34] audit: type=1800 audit(1604239800.190:439): pid=6029 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16260 res=0 errno=0 14:10:00 executing program 3: 14:10:00 executing program 0: 14:10:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000a00)=""/225, 0xe1}, {0x0}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:10:00 executing program 3: 14:10:00 executing program 0: 14:10:00 executing program 3: 14:10:00 executing program 0: 14:10:00 executing program 3: syz_usb_control_io$printer(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000001980)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) [ 806.529950][ T34] audit: type=1800 audit(1604239800.990:440): pid=6051 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16257 res=0 errno=0 14:10:01 executing program 0: 14:10:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00f00800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:01 executing program 0: 14:10:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000014c0)={0x18, 0x1, &(0x7f0000000280)=@raw=[@call], &(0x7f00000002c0)='GPL\x00', 0x2, 0xd0, &(0x7f0000000300)=""/208, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 806.848880][T25171] usb 4-1: new high-speed USB device number 45 using dummy_hcd 14:10:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 14:10:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 807.382961][ T34] audit: type=1800 audit(1604239801.840:441): pid=6076 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16257 res=0 errno=0 14:10:01 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00\x00\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 807.429406][T25171] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 807.438434][T25171] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 807.488267][T25171] usb 4-1: Product: syz [ 807.509918][T25171] usb 4-1: Manufacturer: syz [ 807.518858][T25171] usb 4-1: SerialNumber: syz 14:10:02 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00b00800"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 807.569447][T25171] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested 14:10:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 808.188857][T25171] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 808.206736][ T34] audit: type=1800 audit(1604239802.660:442): pid=6101 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=15937 res=0 errno=0 14:10:02 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100900"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 808.400855][T25900] usb 4-1: USB disconnect, device number 45 [ 808.913255][ T34] audit: type=1800 audit(1604239803.370:443): pid=6117 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16368 res=0 errno=0 [ 809.218865][T25171] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 809.225760][T25171] ath9k_htc: Failed to initialize the device [ 809.242492][T25900] usb 4-1: ath9k_htc: USB layer deinitialized 14:10:04 executing program 3: syz_usb_control_io$printer(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000001980)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) 14:10:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00\x00\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:10:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00 \t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 809.600153][T25900] usb 4-1: new high-speed USB device number 46 using dummy_hcd [ 809.998846][T25900] usb 4-1: device descriptor read/64, error -71 [ 810.268841][T25900] usb 4-1: new high-speed USB device number 47 using dummy_hcd [ 810.293045][ T34] audit: type=1800 audit(1604239804.750:444): pid=6144 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16338 res=0 errno=0 14:10:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00100900"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:04 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x000\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {0x0}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 810.829239][T25900] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 810.841893][T25900] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 810.874031][T25900] usb 4-1: Product: syz [ 810.889552][T25900] usb 4-1: Manufacturer: syz [ 810.903196][T25900] usb 4-1: SerialNumber: syz [ 810.953962][T25900] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested 14:10:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:10:05 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00@\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 811.179250][ T34] audit: type=1800 audit(1604239805.630:445): pid=6154 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16340 res=0 errno=0 14:10:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {0x0}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 811.528900][T25900] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 811.738406][ T34] audit: type=1800 audit(1604239806.190:446): pid=6172 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16358 res=0 errno=0 [ 811.756104][T25171] usb 4-1: USB disconnect, device number 47 14:10:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00P\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00@\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:06 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x000\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000980)=""/74, 0x4a}, {0x0}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0xa, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 812.441571][ T34] audit: type=1800 audit(1604239806.900:447): pid=6185 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16358 res=0 errno=0 14:10:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00001000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 812.568881][T25900] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 812.578190][T25900] ath9k_htc: Failed to initialize the device [ 812.601944][T25171] usb 4-1: ath9k_htc: USB layer deinitialized 14:10:07 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x00\x00\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:07 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x000\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:10:07 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00011000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 813.365878][ T34] audit: type=1800 audit(1604239807.820:448): pid=6205 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16358 res=0 errno=0 14:10:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00001000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) [ 814.104755][ T34] audit: type=1800 audit(1604239808.560:449): pid=6224 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16382 res=0 errno=0 14:10:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00021000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:08 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {'\x000\t\x00'}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00001000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) 14:10:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/43, 0x2b}, {&(0x7f0000000140)=""/224, 0xe0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)=""/82, 0x52}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f0000000340)=""/35, 0x23}, {&(0x7f0000000380)=""/74, 0x4a}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/141, 0x8d}, {&(0x7f0000000540)=""/167, 0xa7}], 0x8, &(0x7f0000000680)=""/116, 0x74}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000700)=""/7, 0x7}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f00000007c0)=""/160, 0xa0}, {&(0x7f0000000880)=""/240, 0xf0}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000000a00)=""/225, 0xe1}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000c00)=""/128, 0x80}, {&(0x7f0000000c80)=""/37, 0x25}], 0x9, &(0x7f0000004780)=""/4096, 0x1000}}, {{&(0x7f0000000d80)=@ax25={{0x3, @bcast}, [@default, @bcast, @null, @remote, @null, @netrom, @netrom, @rose]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)=""/67, 0x43}, {&(0x7f0000000e80)=""/1, 0x1}, {&(0x7f0000000ec0)=""/169, 0xa9}, {&(0x7f0000000f80)=""/107, 0x6b}, {&(0x7f0000001100)=""/248, 0xf8}], 0x5, &(0x7f0000005780)=""/4096, 0x1000}}, {{&(0x7f0000001200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private0}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001080)=""/41, 0x29}, {&(0x7f0000001280)=""/47, 0x2f}, {&(0x7f00000012c0)=""/190, 0xbe}, {&(0x7f0000001380)=""/241, 0xf1}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000006780)=""/246, 0xf6}}, {{&(0x7f0000001580)=@in, 0x80, &(0x7f0000006980)=[{&(0x7f0000006880)=""/199, 0xc7}], 0x1, &(0x7f00000069c0)=""/101, 0x65}}, {{0x0, 0x0, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/248, 0xf8}], 0x1}}], 0x7, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f000000a940)={0x14, 0x4, 0xa, 0x401}, 0x14}}, 0x0) 14:10:09 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00011000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 815.165909][ T34] audit: type=1800 audit(1604239809.620:450): pid=6236 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file1" dev="sda1" ino=16378 res=0 errno=0 14:10:09 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000140)="e193d67b0409908384b38a6e166fceec", 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440)={0x8, {"00031000"}}, 0xfffffc41) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) fadvise64(r1, 0x2e, 0xe7000000, 0x4) [ 815.525601][ T4889] ================================================================== [ 815.533719][ T4889] BUG: KCSAN: data-race in d_delete / lookup_fast [ 815.540111][ T4889] [ 815.542452][ T4889] read-write to 0xffff888029426540 of 4 bytes by task 6253 on cpu 0: [ 815.550504][ T4889] d_delete+0x66/0xa0 [ 815.554475][ T4889] vfs_unlink+0x38f/0x3b0 [ 815.558796][ T4889] do_unlinkat+0x28a/0x4d0 [ 815.563208][ T4889] __x64_sys_unlink+0x2c/0x30 [ 815.567872][ T4889] do_syscall_64+0x39/0x80 [ 815.572276][ T4889] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 815.578163][ T4889] [ 815.580485][ T4889] read to 0xffff888029426540 of 4 bytes by task 4889 on cpu 1: [ 815.588022][ T4889] lookup_fast+0x15f/0x370 [ 815.592423][ T4889] walk_component+0x5c/0x350 [ 815.597000][ T4889] path_lookupat+0x11d/0x550 [ 815.601583][ T4889] filename_lookup+0xf2/0x380 [ 815.606254][ T4889] user_path_at_empty+0x3b/0x50 [ 815.611100][ T4889] do_readlinkat+0x87/0x200 [ 815.615601][ T4889] __x64_sys_readlink+0x43/0x50 [ 815.620451][ T4889] do_syscall_64+0x39/0x80 [ 815.624859][ T4889] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 815.630729][ T4889] [ 815.633068][ T4889] Reported by Kernel Concurrency Sanitizer on: [ 815.639212][ T4889] CPU: 1 PID: 4889 Comm: systemd-udevd Not tainted 5.10.0-rc1-syzkaller #0 [ 815.647777][ T4889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 815.657817][ T4889] ================================================================== [ 815.665887][ T4889] Kernel panic - not syncing: panic_on_warn set ... [ 815.672463][ T4889] CPU: 1 PID: 4889 Comm: systemd-udevd Not tainted 5.10.0-rc1-syzkaller #0 [ 815.681060][ T4889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 815.691103][ T4889] Call Trace: [ 815.694403][ T4889] dump_stack+0x116/0x15d [ 815.698725][ T4889] panic+0x1e7/0x5fa [ 815.702614][ T4889] ? vprintk_emit+0x2f2/0x370 [ 815.707287][ T4889] kcsan_report+0x67b/0x680 [ 815.711801][ T4889] ? default_send_IPI_single+0x42/0x50 [ 815.717253][ T4889] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 815.722788][ T4889] ? lookup_fast+0x15f/0x370 [ 815.727370][ T4889] ? walk_component+0x5c/0x350 [ 815.732124][ T4889] ? path_lookupat+0x11d/0x550 [ 815.736965][ T4889] ? filename_lookup+0xf2/0x380 [ 815.741806][ T4889] ? user_path_at_empty+0x3b/0x50 [ 815.746836][ T4889] ? do_readlinkat+0x87/0x200 [ 815.751505][ T4889] ? __x64_sys_readlink+0x43/0x50 [ 815.756518][ T4889] ? do_syscall_64+0x39/0x80 [ 815.761098][ T4889] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 815.767165][ T4889] ? __d_lookup_rcu+0x39e/0x3e0 [ 815.772009][ T4889] ? __lookup_mnt+0xe9/0xf0 [ 815.776504][ T4889] ? step_into+0x20a/0xe80 [ 815.780916][ T4889] kcsan_setup_watchpoint+0x46a/0x4d0 [ 815.786283][ T4889] lookup_fast+0x15f/0x370 [ 815.790696][ T4889] walk_component+0x5c/0x350 [ 815.795282][ T4889] path_lookupat+0x11d/0x550 [ 815.799868][ T4889] filename_lookup+0xf2/0x380 [ 815.804542][ T4889] ? strncpy_from_user+0x147/0x230 [ 815.809650][ T4889] user_path_at_empty+0x3b/0x50 [ 815.814496][ T4889] do_readlinkat+0x87/0x200 [ 815.819020][ T4889] __x64_sys_readlink+0x43/0x50 [ 815.823866][ T4889] do_syscall_64+0x39/0x80 [ 815.828273][ T4889] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 815.834177][ T4889] RIP: 0033:0x7fca6ec2c087 [ 815.838588][ T4889] Code: 73 01 c3 48 8b 0d 11 be 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 59 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 bd 2b 00 f7 d8 64 89 01 48 [ 815.858208][ T4889] RSP: 002b:00007fff2379d478 EFLAGS: 00000293 ORIG_RAX: 0000000000000059 [ 815.866620][ T4889] RAX: ffffffffffffffda RBX: 00007fff2379d510 RCX: 00007fca6ec2c087 [ 815.874595][ T4889] RDX: 0000000000000200 RSI: 00007fff2379d620 RDI: 00007fff2379d4f0 [ 815.882557][ T4889] RBP: 00007fff2379da78 R08: 0000000000000001 R09: 0000000000000014 [ 815.890522][ T4889] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fff2379d620 [ 815.898486][ T4889] R13: 0000560e35182010 R14: 0000560e351820e0 R15: 00007fff2379d4f0 [ 815.906877][ T4889] Kernel Offset: disabled [ 815.911229][ T4889] Rebooting in 86400 seconds..