[ 62.653289][ T26] audit: type=1804 audit(1570673948.004:47): pid=9078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 62.679312][ T26] audit: type=1804 audit(1570673948.004:48): pid=9079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 62.699868][ T26] audit: type=1804 audit(1570673948.004:49): pid=9076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 62.699893][ T26] audit: type=1804 audit(1570673948.004:50): pid=9076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 [ 62.699915][ T26] audit: type=1804 audit(1570673948.034:51): pid=9080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="init" name="/run/utmp" dev="sda1" ino=1421 res=1 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 67.368897][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 67.368911][ T26] audit: type=1400 audit(1570673952.724:62): avc: denied { map } for pid=9090 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.30' (ECDSA) to the list of known hosts. 2019/10/10 02:19:19 fuzzer started [ 73.807220][ T26] audit: type=1400 audit(1570673959.154:63): avc: denied { map } for pid=9099 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16502 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/10 02:19:21 dialing manager at 10.128.0.26:44309 2019/10/10 02:19:21 syscalls: 2546 2019/10/10 02:19:21 code coverage: enabled 2019/10/10 02:19:21 comparison tracing: enabled 2019/10/10 02:19:21 extra coverage: extra coverage is not supported by the kernel 2019/10/10 02:19:21 setuid sandbox: enabled 2019/10/10 02:19:21 namespace sandbox: enabled 2019/10/10 02:19:21 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/10 02:19:21 fault injection: enabled 2019/10/10 02:19:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/10 02:19:21 net packet injection: enabled 2019/10/10 02:19:21 net device setup: enabled 2019/10/10 02:19:21 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 02:21:54 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) [ 229.478721][ T26] audit: type=1400 audit(1570674114.834:64): avc: denied { map } for pid=9114 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=119 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 02:21:55 executing program 1: pipe2(0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000000000000, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000000000000, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x14}, 0xcc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000000) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x10000) ioctl$MON_IOCX_MFETCH(r3, 0xc00c9207, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, 0xffff}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="1309ffeb"], 0x13) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0) getpid() ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f0000001680)=ANY=[@ANYBLOB="25d336cf062882", @ANYBLOB="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", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16], @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000380)=ANY=[]], @ANYRESOCT, @ANYRES64, @ANYRES32, @ANYRESDEC]) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = dup2(r4, r5) sendmsg$nl_netfilter(r6, &(0x7f0000001340)={&(0x7f0000000000), 0xc, &(0x7f0000001300)={0x0}}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xd8) open(0x0, 0x140, 0x0) r7 = open(0x0, 0x140, 0x0) fcntl$setlease(r7, 0x400, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x9, 0x7fff, 0x68b4, 0x2492d8ae, 0x30, 0xffffffffffffffff, 0xffff, [], r8, 0xffffffffffffffff, 0x3, 0x1}, 0x3c) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 229.639232][ T9115] IPVS: ftp: loaded support on port[0] = 21 [ 229.780027][ T9115] chnl_net:caif_netlink_parms(): no params data found [ 229.837960][ T9115] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.845668][ T9115] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.855139][ T9115] device bridge_slave_0 entered promiscuous mode [ 229.878217][ T9115] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.885400][ T9115] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.895000][ T9115] device bridge_slave_1 entered promiscuous mode [ 229.912291][ T9118] IPVS: ftp: loaded support on port[0] = 21 02:21:55 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 229.948383][ T9115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.970279][ T9115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.071887][ T9115] team0: Port device team_slave_0 added [ 230.087944][ T9115] team0: Port device team_slave_1 added 02:21:55 executing program 3: open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) set_thread_area(&(0x7f0000000040)={0x0, 0x20000800, 0xffffffffffffffff, 0x1, 0x1, 0x0, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) symlink(0x0, 0x0) listen(r2, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(0x0) clock_gettime(0x4, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) setsockopt$sock_timeval(r2, 0x1, 0x43, 0x0, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) prctl$PR_GET_KEEPCAPS(0x7) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r5 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="83a98071d4f9d9b5803ebe91a7fe707211eada5f6737f48ece9e9a0eb3d6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000480)=@random={'security.', 'em0bdev*![\'md5sum%@-\x00'}, 0x0, 0xffffffffffffff98) [ 230.261514][ T9115] device hsr_slave_0 entered promiscuous mode 02:21:55 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x894c, 0x0) [ 230.329745][ T9115] device hsr_slave_1 entered promiscuous mode [ 230.409646][ T9121] IPVS: ftp: loaded support on port[0] = 21 [ 230.416584][ T9118] chnl_net:caif_netlink_parms(): no params data found [ 230.424281][ T9123] IPVS: ftp: loaded support on port[0] = 21 [ 230.485999][ T9115] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.493343][ T9115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.501342][ T9115] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.508472][ T9115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.587222][ T9118] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.594354][ T9118] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.603230][ T9118] device bridge_slave_0 entered promiscuous mode [ 230.611597][ T9118] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.618811][ T9118] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.627799][ T9118] device bridge_slave_1 entered promiscuous mode [ 230.685356][ T9125] IPVS: ftp: loaded support on port[0] = 21 [ 230.691563][ T9118] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.729274][ T9118] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 02:21:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x5460, 0x0) [ 230.793618][ T9118] team0: Port device team_slave_0 added [ 230.853317][ T9118] team0: Port device team_slave_1 added [ 230.862123][ T3009] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.875424][ T3009] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.898792][ T9115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.954913][ T9123] chnl_net:caif_netlink_parms(): no params data found [ 230.992211][ T9121] chnl_net:caif_netlink_parms(): no params data found [ 231.040385][ T9118] device hsr_slave_0 entered promiscuous mode [ 231.097917][ T9118] device hsr_slave_1 entered promiscuous mode [ 231.167252][ T9118] debugfs: Directory 'hsr0' with parent '/' already present! [ 231.196305][ T9130] IPVS: ftp: loaded support on port[0] = 21 [ 231.215412][ T9115] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.241369][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.251037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.290775][ T9123] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.298247][ T9123] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.306073][ T9123] device bridge_slave_0 entered promiscuous mode [ 231.314156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.323640][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.333230][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.340454][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.361037][ T9121] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.369175][ T9121] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.376903][ T9121] device bridge_slave_0 entered promiscuous mode [ 231.385310][ T9123] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.394766][ T9123] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.402740][ T9123] device bridge_slave_1 entered promiscuous mode [ 231.425717][ T9123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 231.439611][ T9123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 231.449386][ T9121] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.456725][ T9121] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.465111][ T9121] device bridge_slave_1 entered promiscuous mode [ 231.481658][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.490650][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.499996][ T9129] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.507127][ T9129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.557688][ T9121] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 231.600385][ T9121] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 231.631297][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.642183][ T9123] team0: Port device team_slave_0 added [ 231.651113][ T9123] team0: Port device team_slave_1 added [ 231.673812][ T9125] chnl_net:caif_netlink_parms(): no params data found [ 231.701640][ T9121] team0: Port device team_slave_0 added [ 231.720854][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 231.730383][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.739907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.748587][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.757222][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.765877][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.783813][ T9121] team0: Port device team_slave_1 added [ 231.796415][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.806067][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.849010][ T9123] device hsr_slave_0 entered promiscuous mode [ 231.887380][ T9123] device hsr_slave_1 entered promiscuous mode [ 231.937436][ T9123] debugfs: Directory 'hsr0' with parent '/' already present! [ 231.948133][ T9118] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.985103][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.996660][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.007334][ T9115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.070755][ T9121] device hsr_slave_0 entered promiscuous mode [ 232.137631][ T9121] device hsr_slave_1 entered promiscuous mode [ 232.177597][ T9121] debugfs: Directory 'hsr0' with parent '/' already present! [ 232.223266][ T9125] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.230986][ T9125] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.240381][ T9125] device bridge_slave_0 entered promiscuous mode [ 232.254366][ T9118] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.273209][ T9125] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.280818][ T9125] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.288968][ T9125] device bridge_slave_1 entered promiscuous mode [ 232.295928][ T9126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.304957][ T9126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.320642][ T9130] chnl_net:caif_netlink_parms(): no params data found [ 232.351257][ T9125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.361232][ T9126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.370915][ T9126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.379768][ T9126] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.387282][ T9126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.395612][ T9126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.419578][ T9125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.459944][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.469253][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.478747][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.486577][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.517263][ T9125] team0: Port device team_slave_0 added [ 232.534700][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 232.544127][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 232.554382][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 232.563440][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 232.572048][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.580954][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.596273][ T9130] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.605096][ T9130] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.613065][ T9130] device bridge_slave_0 entered promiscuous mode [ 232.621536][ T9130] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.629590][ T9130] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.638435][ T9130] device bridge_slave_1 entered promiscuous mode [ 232.646415][ T9125] team0: Port device team_slave_1 added [ 232.654565][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 232.668000][ T9115] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.703801][ T9118] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 232.714867][ T9118] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 232.739433][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.748560][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.758090][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.766674][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.775928][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 232.798027][ T9130] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.814044][ T9130] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.857304][ T26] audit: type=1400 audit(1570674118.204:65): avc: denied { associate } for pid=9115 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 232.884334][ T9118] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 232.902949][ T9123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.949155][ T9125] device hsr_slave_0 entered promiscuous mode [ 232.987631][ T9125] device hsr_slave_1 entered promiscuous mode [ 233.027494][ T9125] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.038473][ T9121] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.051120][ T9130] team0: Port device team_slave_0 added [ 233.059357][ T9130] team0: Port device team_slave_1 added [ 233.112950][ T9123] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.172515][ T9130] device hsr_slave_0 entered promiscuous mode [ 233.197740][ T9130] device hsr_slave_1 entered promiscuous mode 02:21:58 executing program 0: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000440)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0003000000", 0x24) [ 233.237352][ T9130] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.253952][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.282043][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.308056][ T9121] 8021q: adding VLAN 0 to HW filter on device team0 02:21:58 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_tos_u8={{0x11}}, @ip_tos_int={{0x14}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ssrr={0x89, 0x3, 0x20}]}}}], 0x48}, 0x0) [ 233.357392][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.365363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.394285][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.427777][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.438411][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.445658][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.457033][ C0] hrtimer: interrupt took 45965 ns [ 233.500828][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.509844][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.519565][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.527511][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.535365][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.544776][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.588989][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.622018][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.637502][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.646322][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.655979][ T26] audit: type=1400 audit(1570674119.014:66): avc: denied { create } for pid=9154 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 233.670181][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 02:21:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) syz_open_pts(0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=@sha1={0x1, "b8ce6699f3593361775c69b2d3da7f91568073b7"}, 0x15, 0x1) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) [ 233.731047][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.744589][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.746594][ T26] audit: type=1400 audit(1570674119.014:67): avc: denied { write } for pid=9154 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 233.755950][ T9129] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.785046][ T9129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.811787][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.833543][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.853576][ T26] audit: type=1400 audit(1570674119.014:68): avc: denied { read } for pid=9154 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 233.887808][ T9129] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.894931][ T9129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.904341][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 233.912161][ T26] audit: type=1400 audit(1570674119.024:69): avc: denied { map_create } for pid=9154 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 233.937514][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.051520][ T9123] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 234.099202][ T9123] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 234.133996][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.143589][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.162206][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.176714][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.185979][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 02:21:59 executing program 1: pipe2(0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000000000000, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000000000000, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x14}, 0xcc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000000) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x10000) ioctl$MON_IOCX_MFETCH(r3, 0xc00c9207, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, 0xffff}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="1309ffeb"], 0x13) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0) getpid() ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f0000001680)=ANY=[@ANYBLOB="25d336cf062882", @ANYBLOB="989c8303fac9cb5ee54945154285eea5fdedee288deaf8837e1cd62b0f89ce71c43b2d9cdf38294ccdb9fa3a0b0602a5fd463d9b64f67dd3c44b2c93e80d8cc8453eff6e1a2e103e20370022234803a8c9b20657706036215f0190a38e18aec59285167b6a8de2d1ae06a2f8d8b700f124b90961e748c76ca1f3b0ce1f33d5a5c8a3faeeb83006f718085c130937de2902971b76421acdb4997731c5d95fbcb5f9dcf0db9ec613396b0f78b74334917e2bec4ebab38c091de792d78812ec72f31fa7112a7907599d2dd0cf3223fb5f807a8b86f7c4148d4719e92f89e980a14c669a91414f65220419ab05902fd57710eeae503ea61eb9df36dd1a40b4de3333c5e76f7b8d2e685c0354780b8fbe51f7d546fd59eeb1207eef811999fa2feebeb824ba8957020000004e4e6fcc912b8bcd536a0788d83b518771234742f8a0718752a11821f491ad530d292b32909cdd6477822a294611e4344a0507d1766d6afe56e73e9721605c3d8828fa817a314a8efd4e99c6334f6777b4c81dadf36019b2a3631bc56b1275fc7fe07eb633322d9acbd99dfaba8bdc417edabb3815369be8ca7b51e4d9127110cf52e80eeb91d21bfa4925aa5d5e6ad56264cacf07ce63ef37df6eed57717fe8429107e06901c5b3d36a008125ffb28e7f25b6d03f17069d9c83df477a3517be890ecef1ad74429de4aa8b3269752addf14aa81bd46fe2c050a38ccd0863150bbdf7ba65f3344c9b214923180d1db1f22e1c585003809d88b0879cd5dc07b93cfd731261f197811b1b185c2f0863b9f829df919791b6d6b9b00d2d6bdb033e2dd305a4d9b101ad77ac250182da34219aa2e00863c93c3479e77a7cf3f4a5f72d7960488cc01b6b57ed7f742990a4deb438834febf586bb9a2ed1ef7f1d2072eed324af995d60f03ec711433ed6c12813c933328c43fc786b9a39f3cc0af8ac1441a1fd033bbd004eee21ecb21afb7172a072e000bdb123583176b3b38c2e0c70775b3d82d0f9f21cf899c6b6b5c413729911b13bb50ec968aec12231881c18baea932eedaf691a9d1a4daa3cdc3f3f65ef4fe82eae636d1e8dbf495145a3e03a56a88dddac529bce0f0a5619d6264ba8e24609a6d7e653f4ad4bc32a71aa4b81c2614053a784fb290ea74bb0622421a36c865d92033efd1cad5c67c2510c7d64feba0e670ea1a4850aefb34b25bb3a1b4714b9830ce5c694e727b22feb37377512ae70c6b4c1127a7741692e1473947846125a777a7ed48f1276d60c38c0812cc78280c9afdbb949f0c323070c40078e44b931ccc42120b001085fbca2f091e4ea544559282060efeec5623adeee2cf61949737471a6bc57352db80d127739fa9b9bf45b32074020a7ca3ce702f3a6c038950831e2eaac9580145e31c92ac0925317c7e56ee3a994424cbcddbd645e9694a6cb43244b52e5196c31844e4e4f0eb8d75dd3bf807e6868b369c325a6b0af78439e217895ab1042d3ad7df8ae8a560e8e39ea2673a89d9a265eaecce92a2438002000007f6bad2198aceeefc6e67a059190602340a978dbe1c6388ed0377cea6eaea7d6e3d7f062f42896bcbcaf3ac6f713027aacb75981e7de0a40bf4d9c2a66926afe74475249c30213174536ceb092ec59744c0ffc99efa76fa6df6ff2b9ab0c5819117f859569561e2ffe0a4b6ddb93e893e2ce7298cdd5028b3af1c48b34c5f2b70f965d9a486a6bb957e0d51ba65761d6338fdcfda9d6aa5649b1f1f04caed31e4446288efcbbd59c2b671f1418af0cb9b7ca404a9cd34725a16fa0ebe9a51ca30ae1e64f43ce3618c7d56979a03792aa070124994106051ede1b66f6d4bd1ff09edba3488e9e2d3b6c7334ad729dc9a79feb25dc81710648e881e0550642de235ed466e1e9864b3ce5572bcc0525e0d1fa9a69256e756469a0108ad47418b640163c84833572bf72fe7faf93e2fae3a93e1ca851920a4d2e32a235b26a991eecc7d2bea6f9427b586b4ec4796957721c1849ec778a0c18464b0e31f7ebec57b7651ac028b3230ba0580a6955ba4466b5ef4c6b9fc894077ff58832767128399ee235b96cd0a9d8118ad499cecb754e62b9b1d951b1636b1020adb68f09331db7cf2f9dce20ff717ec0dedca96c6eae58d2e0d97ed8ebf04ba53304c8920184d63eeb76cc2b42d53d083170f7b5026093eaedb5d23800e4bd83bf1231c2b9ba5c8b76f40a22c5037f7b1b0369ea7a7e5885efd0f4373b33ad4fcaa5fdd732301dbf66d093c02a064894a55f9dba64d873ca2a188a2d3b6b64a817db791a553498a8576e28a6ecddcc1c0ab63a83ec5b55618ed1309378456cf0f72d39e9f1881c94659050ef2d31acdcff8b5fd6a364c465fa522a541adb28465a14aaf44c0225578f54f3bd66eedf7edadf6874d55b065f3bfe97191517333615c61890803c79b769f922f8497ce68a35487f129b8fcb09e1aa00bf196cda25a11ad09c7b073abc2dfde84d4a52137fc68c2681c3de2910e9401d54b569c89defdde7f5d949424165c3a7f071b9c64e306df58c1e354ac8f5fa0d29c58a40a8c28851ccd1a8b7f4c0dd96f8ab685379c508c422b2056830aaba3a32b0c1be5517466a89fe932d653f5ed7c67cd707f4746c149dc31bd53a6371b1790f6ed47fad6c340733051005743119afc67c5269c7625b3adb45b5318072f30a7f9dbce883008bf7a3ddf93005d760cec0b3b2e024a49fd7b3982707b94211c2f5761a2ebc5592a2b4c7c299cbdb3bb09f57c17f72261ad0d51dfdbfc0b5c26821d08fef08ae53802a167142e3be3409d88816b3e6a8a912732a7b9660bb8c2d4678af88bfe7b319", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16], @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000380)=ANY=[]], @ANYRESOCT, @ANYRES64, @ANYRES32, @ANYRESDEC]) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = dup2(r4, r5) sendmsg$nl_netfilter(r6, &(0x7f0000001340)={&(0x7f0000000000), 0xc, &(0x7f0000001300)={0x0}}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xd8) open(0x0, 0x140, 0x0) r7 = open(0x0, 0x140, 0x0) fcntl$setlease(r7, 0x400, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x9, 0x7fff, 0x68b4, 0x2492d8ae, 0x30, 0xffffffffffffffff, 0xffff, [], r8, 0xffffffffffffffff, 0x3, 0x1}, 0x3c) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 234.195519][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.204850][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.214116][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.223220][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.231648][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 02:21:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) syz_open_pts(0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=@sha1={0x1, "b8ce6699f3593361775c69b2d3da7f91568073b7"}, 0x15, 0x1) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) [ 234.276204][ T9121] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 234.308590][ T9121] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 234.367826][ T9123] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.389008][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.406723][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.430109][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.445498][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.455248][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.472650][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.522090][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.540765][ T9125] 8021q: adding VLAN 0 to HW filter on device bond0 02:22:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) syz_open_pts(0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=@sha1={0x1, "b8ce6699f3593361775c69b2d3da7f91568073b7"}, 0x15, 0x1) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 02:22:00 executing program 1: pipe2(0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40000000000000, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000000000000, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x14}, 0xcc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000000) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x10000) ioctl$MON_IOCX_MFETCH(r3, 0xc00c9207, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0], 0x2, 0xffff}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="1309ffeb"], 0x13) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0) getpid() ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f0000001680)=ANY=[@ANYBLOB="25d336cf062882", @ANYBLOB="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", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16], @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000380)=ANY=[]], @ANYRESOCT, @ANYRES64, @ANYRES32, @ANYRESDEC]) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = dup2(r4, r5) sendmsg$nl_netfilter(r6, &(0x7f0000001340)={&(0x7f0000000000), 0xc, &(0x7f0000001300)={0x0}}, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xd8) open(0x0, 0x140, 0x0) r7 = open(0x0, 0x140, 0x0) fcntl$setlease(r7, 0x400, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x9, 0x7fff, 0x68b4, 0x2492d8ae, 0x30, 0xffffffffffffffff, 0xffff, [], r8, 0xffffffffffffffff, 0x3, 0x1}, 0x3c) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 234.589104][ T9121] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.610636][ T9125] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.624651][ T9130] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.651384][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.665543][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.769563][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.792815][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.825621][ T3009] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.833071][ T3009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.842217][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.851869][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.861039][ T3009] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.861074][ T3009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.861647][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.885949][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.898387][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.906825][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.915764][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.925638][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.952866][ T9130] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.002401][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.024453][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 02:22:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) syz_open_pts(0xffffffffffffffff, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=@sha1={0x1, "b8ce6699f3593361775c69b2d3da7f91568073b7"}, 0x15, 0x1) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000100)}], 0x2}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) add_key$user(0x0, &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) [ 235.050799][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.073746][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.089808][ T9193] blk_update_request: I/O error, dev loop0, sector 520 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 235.124465][ T9125] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 235.198383][ T9125] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.267988][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.279184][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.293426][ T3009] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.300787][ T3009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.309384][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.318779][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.328647][ T3009] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.336012][ T3009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.344538][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.362581][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.390683][ T9220] fuse: Unknown parameter 'ƒ©€qÔùÙµ€>¾‘§þprêÚ_g7ôŽÎžš³Ö0x0000000000000004' [ 235.391063][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.424883][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 02:22:00 executing program 2: pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 235.693480][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.705444][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.730712][ T9129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.766229][ T9125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.793876][ T9130] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 235.821518][ T9130] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.906664][ T9130] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 236.020333][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 236.041440][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 236.084982][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.108089][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.116908][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.131624][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.142268][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.154335][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.163663][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.174295][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.182674][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.268284][ T26] audit: type=1400 audit(1570674121.624:70): avc: denied { create } for pid=9241 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 02:22:01 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) [ 236.309316][ T26] audit: type=1400 audit(1570674121.654:71): avc: denied { ioctl } for pid=9241 comm="syz-executor.4" path="socket:[30917]" dev="sockfs" ino=30917 ioctlcmd=0x894c scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 02:22:01 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) accept(r0, 0x0, 0x0) 02:22:01 executing program 5: 02:22:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 02:22:01 executing program 4: 02:22:01 executing program 3: 02:22:02 executing program 4: 02:22:02 executing program 3: 02:22:02 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 02:22:02 executing program 1: 02:22:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x4) 02:22:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 02:22:02 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 02:22:02 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000040)={'dummy0\x00'}) 02:22:02 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 02:22:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 02:22:02 executing program 4: acct(&(0x7f0000000400)='./file0\x00') 02:22:02 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x10, 0x0, &(0x7f0000000280)=[@register_looper, @free_buffer], 0x0, 0x0, 0x0}) 02:22:02 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="14"], 0x1}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0) 02:22:02 executing program 3: mknod(0x0, 0x0, 0x0) open(0x0, 0x2, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0xb, &(0x7f00006ed000), &(0x7f0000000000)=0x550dc4a64b72a34a) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3200c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe27) connect$inet(0xffffffffffffffff, 0x0, 0x5b) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x800}) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r4, 0x80000001) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000340)={0xe64f, 0x8c17, 0x5, 0x4}, 0x1dd) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x70) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x9, &(0x7f0000000000)=0x8548224, 0x4) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000480)=0x3d) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) getpid() 02:22:02 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) 02:22:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000200)={@random="7066c5db3421", @random="b7f7d4d3a74a", [{}], {@ipv6={0x86dd, {0x0, 0x6, 'Xpw', 0x44, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="a74dd7a86778a7a53697c03eed5f0b83", {[], @gre}}}}}, 0x0) 02:22:02 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="14"], 0x1}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0) 02:22:02 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x10, 0x0, &(0x7f0000000280)=[@register_looper, @free_buffer], 0x0, 0x0, 0x0}) 02:22:02 executing program 5: keyctl$session_to_parent(0x12) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000001}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='attr/fscreate\x00') socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0xf) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x6dbf5dd9) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@rand_addr=0x259, 0x4e21, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x283, 0x0, 0x0, 0x0, 0x27f}, {}, 0x0, 0x0, 0x1, 0x0, 0x2}, {{@in=@multicast2, 0x4d3, 0x3c}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x2, 0x629db67c}}, 0xe8) readv(r1, 0x0, 0x0) r2 = socket$inet(0x10, 0x10000000003, 0x9) r3 = dup2(0xffffffffffffffff, r2) sendmsg(r3, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) 02:22:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x0, 0x300) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 237.823500][ T9303] IPVS: ftp: loaded support on port[0] = 21 02:22:03 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x10, 0x0, &(0x7f0000000280)=[@register_looper, @free_buffer], 0x0, 0x0, 0x0}) [ 238.250194][ T9331] IPVS: ftp: loaded support on port[0] = 21 02:22:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x750, {0x2, 0x4e21, @empty}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x0, 0x4000000000, 0x80000000000, 0xfffffffffffffffe}) socket$inet_tcp(0x2, 0x1, 0x0) 02:22:03 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 02:22:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/81, 0xffffffd5) 02:22:03 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0x10, 0x0, &(0x7f0000000280)=[@register_looper, @free_buffer], 0x0, 0x0, 0x0}) [ 238.339609][ T9342] IPVS: ftp: loaded support on port[0] = 21 [ 238.404596][ T9350] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 238.418734][ T26] audit: type=1804 audit(1570674123.774:72): pid=9351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir080170192/syzkaller.LlrX0I/9/memory.events" dev="sda1" ino=16580 res=1 [ 238.471849][ T9350] CPU: 1 PID: 9350 Comm: syz-executor.4 Not tainted 5.4.0-rc2+ #0 [ 238.479701][ T9350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.479717][ T9350] Call Trace: [ 238.479827][ T9350] dump_stack+0x172/0x1f0 [ 238.479852][ T9350] warn_alloc.cold+0x87/0x17f [ 238.479867][ T9350] ? zone_watermark_ok_safe+0x260/0x260 [ 238.479890][ T9350] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 238.479910][ T9350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.479932][ T9350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.479945][ T9350] ? avc_has_perm+0x401/0x610 [ 238.479966][ T9350] __vmalloc_node_range+0x458/0x7a0 [ 238.479982][ T9350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.480001][ T9350] ? sel_write_load+0x216/0x4c0 [ 238.480017][ T9350] vmalloc+0x6b/0x90 [ 238.480031][ T9350] ? sel_write_load+0x216/0x4c0 [ 238.480045][ T9350] sel_write_load+0x216/0x4c0 [ 238.480066][ T9350] __vfs_write+0x8a/0x110 [ 238.480078][ T9350] ? sel_make_policy_nodes+0x1540/0x1540 [ 238.480094][ T9350] vfs_write+0x268/0x5d0 [ 238.480111][ T9350] ksys_write+0x14f/0x290 [ 238.480126][ T9350] ? __ia32_sys_read+0xb0/0xb0 [ 238.480144][ T9350] ? do_syscall_64+0x26/0x760 [ 238.480158][ T9350] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.480172][ T9350] ? do_syscall_64+0x26/0x760 [ 238.480191][ T9350] __x64_sys_write+0x73/0xb0 [ 238.480208][ T9350] do_syscall_64+0xfa/0x760 [ 238.480225][ T9350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.480237][ T9350] RIP: 0033:0x459a59 [ 238.480252][ T9350] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.480260][ T9350] RSP: 002b:00007f7c86989c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 238.480275][ T9350] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 238.480283][ T9350] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 238.480292][ T9350] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 238.480301][ T9350] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c8698a6d4 [ 238.480310][ T9350] R13: 00000000004c9f83 R14: 00000000004e1c10 R15: 00000000ffffffff [ 238.486613][ T26] audit: type=1800 audit(1570674123.814:73): pid=9351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16580 res=0 [ 238.527625][ T9350] Mem-Info: [ 238.546566][ T9350] active_anon:115548 inactive_anon:192 isolated_anon:0 [ 238.546566][ T9350] active_file:8172 inactive_file:36779 isolated_file:0 [ 238.546566][ T9350] unevictable:0 dirty:642 writeback:0 unstable:0 [ 238.546566][ T9350] slab_reclaimable:11461 slab_unreclaimable:92393 [ 238.546566][ T9350] mapped:58971 shmem:237 pagetables:989 bounce:0 [ 238.546566][ T9350] free:1266428 free_pcp:797 free_cma:0 [ 238.559976][ T9350] Node 0 active_anon:462292kB inactive_anon:768kB active_file:32544kB inactive_file:147116kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235784kB dirty:2556kB writeback:0kB shmem:948kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 290816kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 238.580331][ T26] audit: type=1804 audit(1570674123.814:74): pid=9355 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir080170192/syzkaller.LlrX0I/9/memory.events" dev="sda1" ino=16580 res=1 [ 238.587663][ T9350] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 238.604356][ T9350] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 238.612571][ T9350] lowmem_reserve[]: 0 2547 2548 2548 [ 238.628545][ T9350] Node 0 DMA32 free:1271944kB min:36184kB low:45228kB high:54272kB active_anon:462172kB inactive_anon:776kB active_file:31448kB inactive_file:147132kB unevictable:0kB writepending:2596kB present:3129332kB managed:2611876kB mlocked:0kB kernel_stack:7360kB pagetables:3960kB bounce:0kB free_pcp:2812kB local_pcp:1472kB free_cma:0kB [ 238.720552][ T9350] lowmem_reserve[]: 0 0 1 1 [ 238.766448][ T9350] Node 0 Normal free:4kB min:16kB low:20kB high:24kB active_anon:36kB inactive_anon:0kB active_file:1096kB inactive_file:36kB unevictable:0kB writepending:24kB present:786432kB managed:1172kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 238.917590][ T9350] lowmem_reserve[]: 0 0 0 0 [ 238.954158][ T9350] Node 1 Normal free:3777548kB min:53684kB low:67104kB high:80524kB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB writepending:12kB present:3932160kB managed:3870244kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:236kB local_pcp:120kB free_cma:0kB [ 238.991384][ T9350] lowmem_reserve[]: 0 0 0 0 [ 238.996898][ T9350] Node 0 DMA: [ 238.996914][ T9350] 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 239.021800][ T9350] Node 0 DMA32: 7967*4kB (UM) 409*8kB (ME) 317*16kB (ME) 118*32kB (UME) 54*64kB (UME) 11*128kB (UME) 2*256kB (E) 2*512kB (UE) 2*1024kB (ME) 1*2048kB (U) 297*4096kB (M) = 1270996kB [ 239.040328][ T26] audit: type=1804 audit(1570674124.374:75): pid=9351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir080170192/syzkaller.LlrX0I/9/memory.events" dev="sda1" ino=16580 res=1 [ 239.052017][ T9350] Node 0 Normal: 1*4kB (M) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4kB [ 239.073562][ T9333] IPVS: ftp: loaded support on port[0] = 21 [ 239.086845][ T9350] Node 1 Normal: 3*4kB (UE) 75*8kB (UME) 156*16kB (UM) 83*32kB (UE) 40*64kB (UE) 17*128kB (UM) 7*256kB (UME) 4*512kB (UE) 1*1024kB (M) 1*2048kB (M) 918*4096kB (M) = 3777540kB [ 239.112344][ T9350] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 239.142417][ T9350] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 239.166900][ T26] audit: type=1800 audit(1570674124.374:76): pid=9351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16580 res=0 [ 239.217196][ T9350] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 239.233112][ T9350] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 239.248069][ T9350] 45200 total pagecache pages [ 239.283982][ T9350] 0 pages in swap cache [ 239.295351][ T9350] Swap cache stats: add 0, delete 0, find 0/0 [ 239.315259][ T9350] Free swap = 0kB [ 239.334956][ T9350] Total swap = 0kB [ 239.355285][ T9350] 1965979 pages RAM [ 239.377822][ T9350] 0 pages HighMem/MovableOnly [ 239.393797][ T9350] 341179 pages reserved [ 239.406700][ T9350] 0 pages cma reserved 02:22:06 executing program 3: mknod(0x0, 0x0, 0x0) open(0x0, 0x2, 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0xb, &(0x7f00006ed000), &(0x7f0000000000)=0x550dc4a64b72a34a) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3200c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffe27) connect$inet(0xffffffffffffffff, 0x0, 0x5b) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={0x750, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x800}) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r4, 0x80000001) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000340)={0xe64f, 0x8c17, 0x5, 0x4}, 0x1dd) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="700000007d020000006900010003000000000000000000000000000000000000880001e60000ff0d00000076626f8e6e657400ccff89161b157b2c08006b657972c36e8d0b4d0f9a670008002d776c0000db000000000000000000000000000000f27077b70d44fced7dc11acb6d2f3c617305d9d84a0f00bad1e4740eece87078743d4ab3b83e5b217bd46e93b786a795079d97f8762d3a61cf0acd26ec3e4b02aa7c00a7ad9199405271ca7fa215ec11abec80dcd1273ec228f3d8d0552e81aed7c7b9eace22bfcdce14ecbfe9e7db0db5bca4bfcb378a4fcf43d672b0c4123f2675ffef108aa8def04d19551ec63109dd24d82087b8f7c3c571f7fe16fa0a705da50eab84e4f63fd249963809570e1ab215fd0b702d475c81af79dfef2fc5ecb336b8c2"], 0x70) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x9, &(0x7f0000000000)=0x8548224, 0x4) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000480)=0x3d) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) getpid() 02:22:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001740)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001780)={0x28, r1, 0x1, 0x0, 0x0, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) 02:22:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000340)) 02:22:06 executing program 2: 02:22:06 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 241.281409][ T9369] syz-executor.4: vmalloc: allocation failure: 0 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 241.350935][ T9369] CPU: 1 PID: 9369 Comm: syz-executor.4 Not tainted 5.4.0-rc2+ #0 [ 241.358797][ T9369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.368882][ T9369] Call Trace: [ 241.372192][ T9369] dump_stack+0x172/0x1f0 [ 241.376543][ T9369] warn_alloc.cold+0x87/0x17f [ 241.381250][ T9369] ? zone_watermark_ok_safe+0x260/0x260 [ 241.386818][ T9369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.393081][ T9369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.399330][ T9369] ? avc_has_perm+0x401/0x610 [ 241.404040][ T9369] __vmalloc_node_range+0x458/0x7a0 [ 241.409258][ T9369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.415511][ T9369] ? sel_write_load+0x216/0x4c0 [ 241.420370][ T9369] vmalloc+0x6b/0x90 [ 241.424266][ T9369] ? sel_write_load+0x216/0x4c0 [ 241.429116][ T9369] sel_write_load+0x216/0x4c0 [ 241.433800][ T9369] __vfs_write+0x8a/0x110 [ 241.438169][ T9369] ? sel_make_policy_nodes+0x1540/0x1540 [ 241.444597][ T9369] vfs_write+0x268/0x5d0 [ 241.448849][ T9369] ksys_write+0x14f/0x290 [ 241.453182][ T9369] ? __ia32_sys_read+0xb0/0xb0 [ 241.457955][ T9369] ? do_syscall_64+0x26/0x760 [ 241.462643][ T9369] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.468709][ T9369] ? do_syscall_64+0x26/0x760 [ 241.473393][ T9369] __x64_sys_write+0x73/0xb0 [ 241.477986][ T9369] do_syscall_64+0xfa/0x760 [ 241.482493][ T9369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.488382][ T9369] RIP: 0033:0x459a59 [ 241.492277][ T9369] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.511980][ T9369] RSP: 002b:00007f7c86989c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 241.520393][ T9369] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 241.528359][ T9369] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 241.536335][ T9369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 241.544309][ T9369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7c8698a6d4 [ 241.552278][ T9369] R13: 00000000004c9f83 R14: 00000000004e1c10 R15: 00000000ffffffff [ 241.727314][ T9369] Mem-Info: [ 241.730737][ T9369] active_anon:114496 inactive_anon:193 isolated_anon:0 [ 241.730737][ T9369] active_file:8178 inactive_file:36843 isolated_file:0 [ 241.730737][ T9369] unevictable:0 dirty:727 writeback:0 unstable:0 [ 241.730737][ T9369] slab_reclaimable:11544 slab_unreclaimable:92962 [ 241.730737][ T9369] mapped:58908 shmem:237 pagetables:985 bounce:0 [ 241.730737][ T9369] free:1266939 free_pcp:707 free_cma:0 [ 241.881365][ T9369] Node 0 active_anon:457984kB inactive_anon:772kB active_file:32568kB inactive_file:147372kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235632kB dirty:2896kB writeback:0kB shmem:948kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 294912kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 241.937217][ T9375] IPVS: ftp: loaded support on port[0] = 21 [ 242.007777][ T9369] Node 1 active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:12kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 242.137774][ T9369] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 242.307305][ T9369] lowmem_reserve[]: 0 2547 2548 2548 [ 242.312657][ T9369] Node 0 DMA32 free:1277104kB min:36184kB low:45228kB high:54272kB active_anon:453768kB inactive_anon:772kB active_file:31472kB inactive_file:147336kB unevictable:0kB writepending:2872kB present:3129332kB managed:2611876kB mlocked:0kB kernel_stack:7072kB pagetables:3792kB bounce:0kB free_pcp:2900kB local_pcp:1240kB free_cma:0kB [ 242.452198][ T9369] lowmem_reserve[]: 0 0 1 1 [ 242.456836][ T9369] Node 0 Normal free:4kB min:16kB low:20kB high:24kB active_anon:36kB inactive_anon:0kB active_file:1096kB inactive_file:36kB unevictable:0kB writepending:24kB present:786432kB managed:1172kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 242.492640][ T9369] lowmem_reserve[]: 0 0 0 0 [ 242.499634][ T9369] Node 1 Normal free:3777760kB min:53684kB low:67104kB high:80524kB active_anon:0kB inactive_anon:0kB active_file:144kB inactive_file:0kB unevictable:0kB writepending:12kB present:3932160kB managed:3870244kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 242.534398][ T9369] lowmem_reserve[]: 0 0 0 0 [ 242.543578][ T9369] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 242.564227][ T9369] Node 0 DMA32: 8952*4kB (UME) 413*8kB (UME) 319*16kB (ME) 117*32kB (ME) 54*64kB (UME) 10*128kB (ME) 2*256kB (E) 2*512kB (UE) 2*1024kB (ME) 2*2048kB (M) 297*4096kB (M) = 1276888kB [ 242.588594][ T9369] Node 0 Normal: 1*4kB (M) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4kB [ 242.624032][ T9369] Node 1 Normal: 33*4kB (UE) 88*8kB (UME) 156*16kB (UM) 83*32kB (UE) 40*64kB (UE) 17*128kB (UM) 7*256kB (UME) 4*512kB (UE) 1*1024kB (M) 1*2048kB (M) 918*4096kB (M) = 3777764kB [ 242.657107][ T9369] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 242.682248][ T9369] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 242.708180][ T9369] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 242.722923][ T9369] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 242.733465][ T9369] 45273 total pagecache pages [ 242.743462][ T9369] 0 pages in swap cache [ 242.749741][ T9369] Swap cache stats: add 0, delete 0, find 0/0 [ 242.755811][ T9369] Free swap = 0kB [ 242.764855][ T9369] Total swap = 0kB [ 242.769837][ T9369] 1965979 pages RAM [ 242.773640][ T9369] 0 pages HighMem/MovableOnly [ 242.781732][ T9369] 341179 pages reserved [ 242.785936][ T9369] 0 pages cma reserved 02:22:08 executing program 5: keyctl$session_to_parent(0x12) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000001}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='attr/fscreate\x00') socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0xf) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x6dbf5dd9) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@rand_addr=0x259, 0x4e21, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x283, 0x0, 0x0, 0x0, 0x27f}, {}, 0x0, 0x0, 0x1, 0x0, 0x2}, {{@in=@multicast2, 0x4d3, 0x3c}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x2, 0x629db67c}}, 0xe8) readv(r1, 0x0, 0x0) r2 = socket$inet(0x10, 0x10000000003, 0x9) r3 = dup2(0xffffffffffffffff, r2) sendmsg(r3, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) 02:22:08 executing program 2: 02:22:08 executing program 0: 02:22:08 executing program 1: 02:22:08 executing program 3: 02:22:08 executing program 4: 02:22:08 executing program 2: keyctl$session_to_parent(0x12) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000001}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='attr/fscreate\x00') socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0xf) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x6dbf5dd9) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@rand_addr=0x259, 0x4e21, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x283, 0x0, 0x0, 0x0, 0x27f}, {}, 0x0, 0x0, 0x1, 0x0, 0x2}, {{@in=@multicast2, 0x4d3, 0x3c}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x2, 0x629db67c}}, 0xe8) readv(r1, 0x0, 0x0) r2 = socket$inet(0x10, 0x10000000003, 0x9) r3 = dup2(0xffffffffffffffff, r2) sendmsg(r3, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) 02:22:08 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x10282, 0x0) unlink(&(0x7f0000000080)='./bus\x00') fcntl$lock(r0, 0xf, 0x0) 02:22:08 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10982c2, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000000000}) 02:22:08 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 02:22:08 executing program 0: keyctl$session_to_parent(0x12) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000001}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='attr/fscreate\x00') socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0xf) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x6dbf5dd9) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@rand_addr=0x259, 0x4e21, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x283, 0x0, 0x0, 0x0, 0x27f}, {}, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2}, {{@in=@multicast2, 0x4d3, 0x3c}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x2, 0x629db67c}}, 0xe8) readv(r1, 0x0, 0x0) r2 = socket$inet(0x10, 0x10000000003, 0x9) r3 = dup2(0xffffffffffffffff, r2) sendmsg(r3, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) 02:22:08 executing program 4: sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, "e5"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 243.481569][ T9408] IPVS: ftp: loaded support on port[0] = 21 [ 243.904027][ T9404] IPVS: ftp: loaded support on port[0] = 21 [ 243.940921][ T9409] IPVS: ftp: loaded support on port[0] = 21 02:22:09 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24fd620b2022d5ad63b369aaffe9a6b608a5fece0eca95d71f2d3e60613a027fb50cbcbd92d44076", 0x71}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 02:22:09 executing program 3: keyctl$session_to_parent(0x12) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000001}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='attr/fscreate\x00') socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0xf) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x6dbf5dd9) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@rand_addr=0x259, 0x4e21}, {0x0, 0x0, 0x283, 0x0, 0x0, 0x0, 0x27f}, {}, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2}, {{@in=@multicast2, 0x4d3}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x2, 0x629db67c}}, 0xe8) readv(r1, &(0x7f0000000140), 0x19d) r2 = socket$inet(0x10, 0x10000000003, 0x9) r3 = dup2(0xffffffffffffffff, r2) sendmsg(r3, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) 02:22:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f68fde88b508405c8647cfc00b3dd647f450000000000000000fb0000000000004029588171101000720555fd36f6b8209bbe0b00001600380001000900ff030100029ebd"], 0x45) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) [ 244.134122][ T9431] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 244.180999][ T9436] ptrace attach of "/root/syz-executor.5"[9435] was attempted by "/root/syz-executor.5"[9436] 02:22:09 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24fd620b2022d5ad63b369aaffe9a6b608a5", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 244.390178][ T9430] IPVS: ftp: loaded support on port[0] = 21 [ 244.404944][ T9412] IPVS: ftp: loaded support on port[0] = 21 02:22:09 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10982c2, 0x0) pwritev(r0, 0xffffffffffffffff, 0x1, 0x0) 02:22:09 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 244.925105][ T9467] IPVS: ftp: loaded support on port[0] = 21 02:22:13 executing program 2: 02:22:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x404000) unshare(0x0) accept(r0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 02:22:13 executing program 5: 02:22:13 executing program 1: 02:22:14 executing program 0: keyctl$session_to_parent(0x12) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000001}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='attr/fscreate\x00') socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0xf) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x6dbf5dd9) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@rand_addr=0x259, 0x4e21, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x283, 0x0, 0x0, 0x0, 0x27f}, {}, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2}, {{@in=@multicast2, 0x4d3, 0x3c}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x2, 0x629db67c}}, 0xe8) readv(r1, 0x0, 0x0) r2 = socket$inet(0x10, 0x10000000003, 0x9) r3 = dup2(0xffffffffffffffff, r2) sendmsg(r3, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) 02:22:14 executing program 5: 02:22:14 executing program 1: [ 249.822460][ T9489] IPVS: ftp: loaded support on port[0] = 21 02:22:15 executing program 3: keyctl$session_to_parent(0x12) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000001}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='attr/fscreate\x00') socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0xf) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x6dbf5dd9) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@rand_addr=0x259, 0x4e21}, {0x0, 0x0, 0x283, 0x0, 0x0, 0x0, 0x27f}, {}, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2}, {{@in=@multicast2, 0x4d3}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x2, 0x629db67c}}, 0xe8) readv(r1, &(0x7f0000000140), 0x19d) r2 = socket$inet(0x10, 0x10000000003, 0x9) r3 = dup2(0xffffffffffffffff, r2) sendmsg(r3, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) 02:22:15 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x2000000000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) creat(0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 02:22:15 executing program 2: 02:22:15 executing program 5: msgget$private(0x0, 0x2bfdac8c0d6997c9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xb, &(0x7f0000000340)=0x6, 0x4) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2c, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xeb5}, 0x200000000, 0x8, 0x0, 0x0, 0x2000000000}, 0x0, 0x8b, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 02:22:15 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, '\"oi8-u'}}]}) 02:22:15 executing program 2: keyctl$session_to_parent(0x12) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x80000001}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='attr/fscreate\x00') socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0xf) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x6dbf5dd9) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@rand_addr=0x259, 0x4e21}, {0x0, 0x0, 0x283, 0x0, 0x0, 0x0, 0x27f}, {}, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2}, {{@in=@multicast2, 0x4d3}, 0x0, @in=@empty, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x2, 0x629db67c}}, 0xe8) readv(r1, &(0x7f0000000140), 0x19d) r2 = socket$inet(0x10, 0x10000000003, 0x9) r3 = dup2(0xffffffffffffffff, r2) sendmsg(r3, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) [ 250.472396][ T9497] hfs: unable to load codepage ""oi8-u" [ 250.487160][ T9497] hfs: unable to parse mount options 02:22:15 executing program 4: ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x8) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=@fragment, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000540), 0x8}, 0x0, 0xfffffffffffffff8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd', @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030f37b3034303030302c757365", @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xa3, 0x0) ioctl$sock_ifreq(r1, 0x8929, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)=0xffffffff7fffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000300)="585ccbc4ed83b836c1a64749b66147f9cb451c91690000000042e3d75228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb748c4ec93c2db8eae321c7ccda650bd6a6129c2ee45cc9b3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcf8a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000"/192, 0xc0, r3) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, 0x80000000000005f, 0x0, 0x0, [{}]}) [ 250.603833][ T9497] hfs: unable to load codepage ""oi8-u" [ 250.637852][ T9497] hfs: unable to parse mount options 02:22:16 executing program 0: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x10000005c) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={r1, @local, @broadcast}, 0xc) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000003) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000001740)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0x31, 0x4, 0x80, 0x6, 0x8, 0x0, "9432d7846dacb05a5ecf43c8f367389580a455bc2abeb1d884b0700810ceb9886f80cd11cfdf4955b70e5f0a4a09e1cad2"}, 0x149) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) getdents64(r2, &(0x7f00000005c0)=""/4096, 0x1000) 02:22:16 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x2c, 0xff, 0x0, 0x0, 0x0, 0x0, 0x40109, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4610, 0x0, @perf_config_ext={0xeb5}, 0x200000000, 0x8, 0x0, 0x0, 0x2000000000, 0xffffc}, 0x0, 0x8b, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 02:22:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) [ 250.851576][ T9518] fuse: Bad value for 'fd' [ 250.867851][ T9500] IPVS: ftp: loaded support on port[0] = 21 02:22:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) [ 251.066283][ T9541] debugfs: File 'dropped' in directory 'loop0' already present! [ 251.155960][ T9515] IPVS: ftp: loaded support on port[0] = 21 [ 251.169702][ T9541] debugfs: File 'msg' in directory 'loop0' already present! 02:22:16 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000000080)=[{{0x0, 0x8100, 0x0}}], 0x210, 0x2, 0x0) [ 251.256005][ T9541] debugfs: File 'trace0' in directory 'loop0' already present! [ 251.285264][ T9535] ------------[ cut here ]------------ [ 251.290999][ T9535] WARNING: CPU: 1 PID: 9535 at fs/readdir.c:110 verify_dirent_name+0x67/0x80 [ 251.299755][ T9535] Kernel panic - not syncing: panic_on_warn set ... [ 251.306348][ T9535] CPU: 1 PID: 9535 Comm: syz-executor.0 Not tainted 5.4.0-rc2+ #0 [ 251.314148][ T9535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.324214][ T9535] Call Trace: [ 251.327515][ T9535] dump_stack+0x172/0x1f0 [ 251.331854][ T9535] ? iterate_dir+0x5c0/0x5e0 [ 251.336554][ T9535] panic+0x2e3/0x75c [ 251.340455][ T9535] ? add_taint.cold+0x16/0x16 [ 251.341489][ T9500] kobject: 'tx-0' (000000001eab90e0): kobject_uevent_env [ 251.345165][ T9535] ? printk+0xba/0xed [ 251.345190][ T9535] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 251.345211][ T9535] ? __warn.cold+0x14/0x35 [ 251.366081][ T9535] ? verify_dirent_name+0x67/0x80 [ 251.371125][ T9535] __warn.cold+0x2f/0x35 [ 251.375400][ T9535] ? report_bug.cold+0x63/0xad [ 251.380174][ T9535] ? verify_dirent_name+0x67/0x80 [ 251.385205][ T9535] report_bug+0x289/0x300 [ 251.389551][ T9535] do_error_trap+0x11b/0x200 [ 251.394147][ T9535] do_invalid_op+0x37/0x50 [ 251.398562][ T9535] ? verify_dirent_name+0x67/0x80 [ 251.403694][ T9535] invalid_op+0x23/0x30 [ 251.407855][ T9535] RIP: 0010:verify_dirent_name+0x67/0x80 [ 251.413492][ T9535] Code: 16 b6 ff 44 89 e0 5b 41 5c 5d c3 e8 93 16 b6 ff 0f 0b e8 8c 16 b6 ff 41 bc fb ff ff ff 5b 44 89 e0 41 5c 5d c3 e8 79 16 b6 ff <0f> 0b 41 bc fb ff ff ff eb ca 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 [ 251.433100][ T9535] RSP: 0018:ffff888063b27ad0 EFLAGS: 00010212 [ 251.439183][ T9535] RAX: 0000000000040000 RBX: 000000000000000c RCX: ffffc90006220000 [ 251.447161][ T9535] RDX: 00000000000042a5 RSI: ffffffff81bcfb87 RDI: ffff888063b27cd3 [ 251.452263][ T9500] kobject: 'tx-0' (000000001eab90e0): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 251.455136][ T9535] RBP: ffff888063b27ae0 R08: ffff888066d28500 R09: 0000000000000004 [ 251.455146][ T9535] R10: fffffbfff120d9b8 R11: ffffffff8906cdc3 R12: 0000000000000000 [ 251.455155][ T9535] R13: 0000000000000000 R14: 0000000000000004 R15: ffff888063b27e50 [ 251.455184][ T9535] ? verify_dirent_name+0x67/0x80 [ 251.494839][ T9535] filldir64+0x40/0x670 [ 251.499030][ T9535] ? _raw_spin_unlock+0x2d/0x50 [ 251.503909][ T9535] ? iunique+0x19f/0x1e0 [ 251.508162][ T9535] __fat_readdir+0xd9e/0x1cb0 [ 251.512850][ T9535] ? trace_hardirqs_on_caller+0x6a/0x240 [ 251.518509][ T9535] ? fat_search_long+0x1350/0x1350 [ 251.523627][ T9535] ? __lock_acquire+0x293a/0x4a00 [ 251.528655][ T9535] ? lock_acquire+0x20b/0x410 [ 251.533352][ T9535] ? __kasan_check_write+0x14/0x20 [ 251.538472][ T9535] ? down_read_killable+0x10c/0x490 [ 251.543677][ T9535] ? selinux_file_permission+0x9b/0x580 [ 251.549228][ T9535] ? rwsem_down_read_slowpath+0xfb0/0xfb0 [ 251.554959][ T9535] fat_readdir+0x44/0x60 [ 251.559203][ T9535] iterate_dir+0x47f/0x5e0 [ 251.563637][ T9535] ksys_getdents64+0x1ce/0x320 [ 251.568404][ T9535] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 251.573739][ T9535] ? compat_filldir+0x3a0/0x3a0 [ 251.578606][ T9535] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 251.584064][ T9535] ? do_syscall_64+0x26/0x760 [ 251.588749][ T9535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.594957][ T9535] ? do_syscall_64+0x26/0x760 [ 251.599659][ T9535] __x64_sys_getdents64+0x73/0xb0 [ 251.604695][ T9535] do_syscall_64+0xfa/0x760 [ 251.609206][ T9535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.615093][ T9535] RIP: 0033:0x459a59 [ 251.618985][ T9535] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.638603][ T9535] RSP: 002b:00007f554bfa6c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 251.647014][ T9535] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 251.654987][ T9535] RDX: 0000000000001000 RSI: 00000000200005c0 RDI: 0000000000000006 [ 251.662961][ T9535] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 251.670934][ T9535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f554bfa76d4 [ 251.678904][ T9535] R13: 00000000004c0535 R14: 00000000004d2c58 R15: 00000000ffffffff [ 251.688596][ T9535] Kernel Offset: disabled [ 251.693037][ T9535] Rebooting in 86400 seconds..