[....] Starting OpenBSD Secure Shell server: sshd[ 30.379130] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.145911] random: sshd: uninitialized urandom read (32 bytes read) [ 33.476631] kauditd_printk_skb: 9 callbacks suppressed [ 33.476639] audit: type=1400 audit(1569000416.636:35): avc: denied { map } for pid=6953 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 33.531887] random: sshd: uninitialized urandom read (32 bytes read) [ 34.160011] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.212' (ECDSA) to the list of known hosts. [ 39.623334] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/20 17:27:03 fuzzer started [ 39.815675] audit: type=1400 audit(1569000422.976:36): avc: denied { map } for pid=6963 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 40.551256] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/20 17:27:04 dialing manager at 10.128.0.105:35365 2019/09/20 17:27:04 syscalls: 2472 2019/09/20 17:27:04 code coverage: enabled 2019/09/20 17:27:04 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/20 17:27:04 extra coverage: extra coverage is not supported by the kernel 2019/09/20 17:27:04 setuid sandbox: enabled 2019/09/20 17:27:04 namespace sandbox: enabled 2019/09/20 17:27:04 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/20 17:27:04 fault injection: enabled 2019/09/20 17:27:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/20 17:27:04 net packet injection: enabled 2019/09/20 17:27:04 net device setup: enabled [ 42.460750] random: crng init done 17:28:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}}, 0x0) 17:28:34 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) 17:28:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$nfs(&(0x7f00000005c0)='nfs\x00', &(0x7f00000007c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x3, &(0x7f00000019c0)=[{&(0x7f0000000800)="8a437f6a7d1e057c23895f28b94c7db232c5b3f9689efc3b047e0424ce426effc55cd109208ad28fc7e17981060aea91a974848db2167706d0409b9982775fd178431acf6df86dbb3e65fba82dfb06abb498991fade434847e66ebaba0e7e7b67d99b16a7faef86abcc54b286100e1911bf5de8f5eafa1f0ca196e7d2f628064dfee354513808564b60ae86e85735b7d3eac5cd021caebcf80a56ae6fd2cff71cab519b22dfda4f2806087cdbe52164ac336bfe17e5959fbdb4ae5ecd346397d7014cf5bb9a296", 0xc7, 0x3}, {&(0x7f0000000900)="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", 0x7f7, 0x8}, {&(0x7f0000001900)=',', 0x1}], 0x2000000, &(0x7f0000001a40)='cgroup@\\%vboxnet0wlan0\x00') 17:28:34 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1) 17:28:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="f0000000100013070000eaf892004000000000fe8000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000000003200000000000000000000000000ffff00000000ff010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200"/168], 0xf0}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 17:28:34 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="30000002000000ebffffffffffffff00048d1a3bc7c2bc9d493ae3075d2204fa261bcc5a89ffc0085d453958a5"], 0x2d}}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x1) [ 131.520341] audit: type=1400 audit(1569000514.686:37): avc: denied { map } for pid=6963 comm="syz-fuzzer" path="/root/syzkaller-shm101189205" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 131.580281] audit: type=1400 audit(1569000514.696:38): avc: denied { map } for pid=6981 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=78 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 131.930886] IPVS: ftp: loaded support on port[0] = 21 [ 132.748678] chnl_net:caif_netlink_parms(): no params data found [ 132.761483] IPVS: ftp: loaded support on port[0] = 21 [ 132.785983] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.793587] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.800985] device bridge_slave_0 entered promiscuous mode [ 132.809569] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.816242] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.823764] device bridge_slave_1 entered promiscuous mode [ 132.842397] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 132.855090] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 132.878424] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 132.885576] team0: Port device team_slave_0 added [ 132.891137] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 132.898160] team0: Port device team_slave_1 added [ 132.904948] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 132.913926] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 132.930974] IPVS: ftp: loaded support on port[0] = 21 [ 132.973114] device hsr_slave_0 entered promiscuous mode [ 133.030375] device hsr_slave_1 entered promiscuous mode [ 133.072448] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 133.081649] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 133.104734] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.111669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.118439] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.124826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.165072] chnl_net:caif_netlink_parms(): no params data found [ 133.223508] IPVS: ftp: loaded support on port[0] = 21 [ 133.235476] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.242870] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.249633] device bridge_slave_0 entered promiscuous mode [ 133.259807] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.266356] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.273275] device bridge_slave_1 entered promiscuous mode [ 133.289415] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 133.298333] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 133.322852] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 133.328970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 133.338280] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 133.345617] team0: Port device team_slave_0 added [ 133.352547] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 133.359675] team0: Port device team_slave_1 added [ 133.387880] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 133.397575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 133.405574] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 133.481974] device hsr_slave_0 entered promiscuous mode [ 133.520339] device hsr_slave_1 entered promiscuous mode [ 133.606140] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 133.612535] 8021q: adding VLAN 0 to HW filter on device team0 [ 133.619072] chnl_net:caif_netlink_parms(): no params data found [ 133.619563] IPVS: ftp: loaded support on port[0] = 21 [ 133.633514] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 133.643706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.652664] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.669738] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.687054] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 133.705950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.714506] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.720906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.733891] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 133.764713] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 133.783554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.791481] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.797835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.810840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 133.822604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 133.836609] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.843414] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.850495] device bridge_slave_0 entered promiscuous mode [ 133.856637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.864569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.874188] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 133.895083] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.902457] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.909308] device bridge_slave_1 entered promiscuous mode [ 133.921037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.928693] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.936352] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.968423] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 133.976815] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 133.993520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 134.001242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 134.009446] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 134.021194] IPVS: ftp: loaded support on port[0] = 21 [ 134.036133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 134.046051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 134.061560] chnl_net:caif_netlink_parms(): no params data found [ 134.073535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.081201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.088735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.097626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.115233] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 134.121749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 134.128939] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 134.136190] team0: Port device team_slave_0 added [ 134.142579] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 134.149618] team0: Port device team_slave_1 added [ 134.193552] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 134.248253] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 134.302079] device hsr_slave_0 entered promiscuous mode [ 134.340339] device hsr_slave_1 entered promiscuous mode [ 134.384043] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 134.393931] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.400651] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.407481] device bridge_slave_0 entered promiscuous mode [ 134.416297] chnl_net:caif_netlink_parms(): no params data found [ 134.428433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.435065] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 134.447967] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.454937] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.462005] device bridge_slave_1 entered promiscuous mode [ 134.484076] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 134.493581] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 134.502096] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 134.521759] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 134.528860] team0: Port device team_slave_0 added [ 134.534754] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 134.542003] team0: Port device team_slave_1 added [ 134.549201] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.592462] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 134.601550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 134.612289] chnl_net:caif_netlink_parms(): no params data found [ 134.631885] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 134.650440] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 134.658091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.665408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.696790] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.703994] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.711890] device bridge_slave_0 entered promiscuous mode [ 134.718770] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 134.764698] device hsr_slave_0 entered promiscuous mode [ 134.790746] device hsr_slave_1 entered promiscuous mode [ 134.846666] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.853205] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.860346] device bridge_slave_1 entered promiscuous mode [ 134.875566] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 134.887304] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.898180] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 134.923582] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 134.934682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 17:28:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x1000, 0x550) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) dup(r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x109880, 0x0) sendto$inet6(r2, &(0x7f00000001c0)="150300000600400000000200850cf7c21975e697080080356b2a2fcddad8897c6f11876d52b84a3575a364e84c92886b662100080027471cc5470a66e79f60d8b33deae307d0057461000000", 0x4c, 0x5020, 0x0, 0x0) [ 134.946429] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 17:28:38 executing program 5: syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) syz_open_dev$swradio(0x0, 0x1, 0x2) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80080, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) ioctl$TIOCSETD(r1, 0x5412, &(0x7f00000000c0)=0xffffffdb) fcntl$setsig(r1, 0xa, 0x34) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="006386dd07f043fa36c8d32526f25bee4cebb9f4dd33ec9174f3febe518576000000030000000000000000"], 0x2b) [ 134.972218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.982249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.993220] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.999574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.007883] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 135.032781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 135.042075] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.048447] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.056074] device bridge_slave_0 entered promiscuous mode [ 135.063579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 135.070871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.078662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.086429] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.092813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.109919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 135.117679] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.124208] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.132792] device bridge_slave_1 entered promiscuous mode [ 135.151012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 135.160457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 135.210044] hrtimer: interrupt took 45958 ns [ 135.228580] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 135.234838] mkiss: ax0: crc mode is auto. [ 135.242491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 135.250811] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 135.258534] team0: Port device team_slave_0 added [ 135.265132] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 135.278513] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 135.291409] device nr0 entered promiscuous mode [ 135.297796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 135.313512] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 135.322231] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 135.336026] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 135.343622] team0: Port device team_slave_1 added [ 135.349830] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 135.382687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.393592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.402269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 135.410315] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 135.417810] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.428050] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 135.434631] 8021q: adding VLAN 0 to HW filter on device team0 [ 135.444288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 135.451526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 135.469887] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 135.477195] team0: Port device team_slave_0 added [ 135.493554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.501444] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.509691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 135.519816] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 135.527024] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 135.535299] team0: Port device team_slave_1 added [ 135.540658] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 135.548669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 135.557114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.564664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.574176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.582369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.591728] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.598135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.673238] device hsr_slave_0 entered promiscuous mode [ 135.710424] device hsr_slave_1 entered promiscuous mode [ 135.751029] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 135.758199] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 135.765264] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 135.832656] device hsr_slave_0 entered promiscuous mode [ 135.870341] device hsr_slave_1 entered promiscuous mode [ 135.911114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 135.924253] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 135.932957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 135.950804] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 135.957833] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 135.966469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.974328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.987281] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 135.995233] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 136.005635] 8021q: adding VLAN 0 to HW filter on device batadv0 17:28:39 executing program 5: syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) syz_open_dev$swradio(0x0, 0x1, 0x2) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80080, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) ioctl$TIOCSETD(r1, 0x5412, &(0x7f00000000c0)=0xffffffdb) fcntl$setsig(r1, 0xa, 0x34) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="006386dd07f043fa36c8d32526f25bee4cebb9f4dd33ec9174f3febe518576000000030000000000000000"], 0x2b) [ 136.013784] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 136.024452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.037942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.049138] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.055559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.075353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 136.135506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 136.147023] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 136.172963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 136.183661] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 136.236744] mkiss: ax0: crc mode is auto. [ 136.244124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 136.273122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 136.297331] 8021q: adding VLAN 0 to HW filter on device bond0 [ 136.309021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 136.318508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 136.331899] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 136.339043] device nr0 entered promiscuous mode [ 136.347538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 136.358284] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.372280] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 136.378915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 17:28:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000006680)={0x0, 0x0, &(0x7f0000006440)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x10}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0xfffffffffffffffa, 0x40000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) poll(&(0x7f0000000100)=[{r1, 0x2}, {r2, 0x188}, {r1, 0x40}, {}, {r3}, {r3}], 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x0) r4 = syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) readv(r4, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) r7 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r7) clock_gettime(0x1, 0x0) socket$inet(0x2, 0x4000000000000002, 0x0) sendfile(r3, r7, 0x0, 0x20000102000007) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) r9 = fcntl$getown(r2, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r9, r7, 0x0, 0x3, &(0x7f0000000280)=':\\\x00', 0xffffffffffffffff}, 0x30) write$P9_RCLUNK(r2, &(0x7f0000000000)={0x7}, 0x7) socket$inet6(0xa, 0x0, 0x0) signalfd(r8, &(0x7f0000000180)={0x100}, 0x8) [ 136.398973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 136.447270] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 136.457777] audit: type=1400 audit(1569000519.626:39): avc: denied { create } for pid=7062 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 136.484508] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 136.490410] audit: type=1400 audit(1569000519.626:40): avc: denied { write } for pid=7062 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 136.498142] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 136.526197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 136.534034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.541534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.548331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.555306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.562204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.571770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 136.588346] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 136.595640] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.606272] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 136.606283] 8021q: adding VLAN 0 to HW filter on device team0 [ 136.628989] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 136.654193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 136.672519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.690283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 136.707653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.729135] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.735579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.771023] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 136.777088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 136.801891] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 17:28:40 executing program 5: modify_ldt$read(0x0, &(0x7f0000000000)=""/33, 0x21) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x10000000000}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000140)=0x432) getsockopt$inet_opts(r0, 0x0, 0x12, &(0x7f00000001c0)=""/232, &(0x7f00000000c0)=0xe8) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) [ 136.833890] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 136.861812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 136.871224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 17:28:40 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000180)="cd6b9f242162975c13e7cb19ae26b0da5ee24a6ef3b8cb7cc3e644fe946dab054bd865180310077a5844e63dab3842de67e40be241ba13a8dd47d200e8efbbc06c8b972d18dd2f1ae8c02760f627c907c022fbfb865565c04173bd0d653132f3e8cafc2567b08d9b7b7ce7e5e7812efcc2bc8fa32e5adebdfbcc6087dea12773c7407e9d2b871e96ddf80f6a45cc9d16aec0d5746a27cd19464bcb3fcf7e237e81c59613c9a1b77393045f7b502b21ac4f7464adb500517fa669a23bac0eccd6eb7fb2f3403be7a6e07df711795a550ac9776786c07908b65ce8223d3edd6519628f2d7c6194"}, 0x20) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4, 0x5}, @timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 136.898524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.912207] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.918624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.931940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 17:28:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000006680)={0x0, 0x0, &(0x7f0000006440)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x10}], 0x1}, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0xfffffffffffffffa, 0x40000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) poll(&(0x7f0000000100)=[{r1, 0x2}, {r2, 0x188}, {r1, 0x40}, {}, {r3}, {r3}], 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x0) r4 = syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) readv(r4, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) r7 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r7) clock_gettime(0x1, 0x0) socket$inet(0x2, 0x4000000000000002, 0x0) sendfile(r3, r7, 0x0, 0x20000102000007) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) r9 = fcntl$getown(r2, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r9, r7, 0x0, 0x3, &(0x7f0000000280)=':\\\x00', 0xffffffffffffffff}, 0x30) write$P9_RCLUNK(r2, &(0x7f0000000000)={0x7}, 0x7) socket$inet6(0xa, 0x0, 0x0) signalfd(r8, &(0x7f0000000180)={0x100}, 0x8) [ 136.944081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.959432] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.965957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.989285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 137.017284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 137.036858] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 137.044587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.052680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.053052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.053334] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.053365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.053693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.056100] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 137.099790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 137.110401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.121797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.131811] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 137.133674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 137.166203] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.209448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.217344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.239257] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.249305] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 137.259739] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 137.267821] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 137.278989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.294168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.303767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.313410] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 137.321605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 137.331375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 137.338297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.346526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.361213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.368953] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.376654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.384312] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.392875] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 137.399097] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.406016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.412876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.421713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 137.429371] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 137.441399] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 137.447500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 137.457315] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 137.467147] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 137.473657] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.479828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.490352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.497694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.505280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.516544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 137.526190] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 137.536710] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 137.542946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 137.553074] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 137.561081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.568524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.576260] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.584051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.591898] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.598217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.605700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.614929] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 137.632479] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 137.646725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.659894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.667576] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.673945] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.683801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 137.694235] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 137.712098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.725448] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 137.733017] audit: type=1804 audit(1569000520.906:41): pid=7105 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir370286604/syzkaller.T75wnv/0/file0" dev="sda1" ino=16524 res=1 17:28:40 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, 0x0) 17:28:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2001, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000080)={0x14}, 0x14) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4000000000000a, 0x0, "084afc1956080000004dfaa825361d944c904c"}) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x400000000}) [ 137.735350] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 137.771346] audit: type=1804 audit(1569000520.936:42): pid=7105 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir370286604/syzkaller.T75wnv/0/file0" dev="sda1" ino=16524 res=1 [ 137.805317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.821129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 137.846745] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 137.863873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 137.876264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 137.904860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 137.918403] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 137.926660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.950876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.979442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 137.987946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.995829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.021158] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 138.027982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.046188] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.059796] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 138.072451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 138.112461] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 17:28:41 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x210, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0xe603fc8c4ec476f0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="c9737aaf", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x220, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r3, 0x5}}, 0x10) r4 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000180)={'ip6gretap0\x00', @ifru_mtu=0xc8ba}) [ 138.139706] 8021q: adding VLAN 0 to HW filter on device batadv0 17:28:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x5) ioctl$TIOCSETD(r0, 0x5412, &(0x7f00000000c0)=0xffffffdb) signalfd4(r0, &(0x7f0000000100)={0x8}, 0x8, 0x20a84fe805546ebd) r1 = syz_open_dev$rtc(&(0x7f0000000000), 0x0, 0x2000) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000040)=0x3f) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000001f7b5cf300"/104], 0x68) preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000080)={0xb, 0x31, 0x16, 0x18, 0x7, 0x1, 0x3, 0x4b, 0xffffffffffffffff}) dup2(r2, r1) [ 138.589876] mkiss: ax0: crc mode is auto. [ 138.649239] mkiss: ax0: crc mode is auto. 17:28:42 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="30000002000000ebffffffffffffff00048d1a3bc7c2bc9d493ae3075d2204fa261bcc5a89ffc0085d453958a5"], 0x2d}}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x1) 17:28:42 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000080)={0x0, @bt={0x100000001, 0x1, 0x1, 0x1, 0x5, 0x9, 0x8001, 0x6, 0x64, 0x400, 0x1, 0x6, 0x6, 0xffffffffffff8001, 0x0, 0x2}}) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(r2, 0x80045643, 0x3) syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000140)=0xfffffffffffffffe) 17:28:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="38f37fdba040c4d5415a871b0f0138"], 0x0, 0xf}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/wireless\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = getegid() write$P9_RGETATTR(r3, &(0x7f00000002c0)={0xa0, 0x19, 0x1, {0x200, {0x6c, 0x1, 0x6}, 0x2, r5, r6, 0x1, 0x80000000, 0x9, 0x6, 0x3ff, 0x7, 0x7, 0x4, 0x2, 0x8, 0x4, 0xa0000000000000, 0x401, 0xfff, 0x5}}, 0xa0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:28:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x5) ioctl$TIOCSETD(r3, 0x5412, &(0x7f00000000c0)=0xffffffdb) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCINQ(r5, 0x541b, &(0x7f0000000180)) preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r3, &(0x7f0000000080)={0x140000006}) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x989680}) 17:28:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0xffffffffffffff0b, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000001c0), r1, 0x0, 0x0, 0x1}}, 0x20) 17:28:42 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="30000002000000ebffffffffffffff00048d1a3bc7c2bc9d493ae3075d2204fa261bcc5a89ffc0085d453958a5"], 0x2d}}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x1) 17:28:42 executing program 1: r0 = socket$inet(0x2, 0xa, 0xfffffffffffff801) getsockopt(r0, 0x0, 0xcf, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xb0982, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000080)={0x3ff, 0x7ff, 0x100000000}, 0xfec1) [ 139.012103] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 139.039227] mkiss: ax0: crc mode is auto. 17:28:42 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000040)={{0x9}, {0x3, 0x2}, 0x7, 0x0, 0x200}) getsockopt(r0, 0x114, 0x1000000000005, &(0x7f0000af0fe7)=""/13, &(0x7f00000000c0)=0x2f4) 17:28:42 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/54, &(0x7f00000000c0)=0x36) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) [ 139.136622] mkiss: ax0: crc mode is auto. [ 139.168065] IPVS: length: 54 != 24 17:28:42 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="30000002000000ebffffffffffffff00048d1a3bc7c2bc9d493ae3075d2204fa261bcc5a89ffc0085d453958a5"], 0x2d}}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x1) 17:28:42 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x2, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = socket(0xb211c58fb9816519, 0x1, 0x8) getsockname$inet6(r1, 0x0, &(0x7f00000000c0)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x93a5ed16d24efed1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x10001) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000000)=""/78, &(0x7f0000000080)=0x4e) 17:28:42 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x2000000000000021, 0x2, 0x1000000000000a) connect$rxrpc(r1, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d642fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0add5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c39f0825e35fe206f244ad5247c752dbe0ad164bda538a624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db"], 0x18}}], 0x40000000000037b, 0xc000) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) dup2(r0, r1) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)='bridge_slave_1\x00', 0x6, 0x100, 0x5}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000040)=0x5) [ 139.189339] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 139.214480] IPVS: length: 54 != 24 17:28:42 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x1) 17:28:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r1, 0x4000000000000005) dup3(r2, r0, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x200400, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f00000000c0)={0x3, 0x2, 0x4, 0xa, 0x3f, 0x81}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x12600, 0x0) writev(r0, &(0x7f0000000500)=[{&(0x7f00000001c0)="89", 0x1}], 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x5) 17:28:43 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ee064b684f78437526ec0200d4ea8a4a20d4eb2006bc3bb5c85b213ab360b65789406b5908921a4c1969d0beb1e1c5221434030f63aa0b6f16"], 0x1}}, 0x0) r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000040)=0x7) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) 17:28:43 executing program 3: socket$kcm(0x10, 0x2, 0x10) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff67, &(0x7f0000000040), 0x1, 0x0, 0x0, 0x2}, 0x0) r1 = gettid() r2 = openat$null(0xffffffffffffff9c, 0x0, 0x204d00, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000240)={0x800000000c, 0x9, 0x7fffffff, 'queue0\x00', 0x7fe}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') prctl$PR_GET_FPEXC(0xb, &(0x7f0000000200)) preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000400)={0x0, 0x798}, &(0x7f0000000440)=0x8) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000600), &(0x7f0000000640)=0x4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0x5) ioctl$TIOCSETD(r5, 0x5412, &(0x7f00000000c0)=0xffffffdb) write$binfmt_misc(r5, 0x0, 0x8b59d33315189216) write$binfmt_misc(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a3157b42cadf7b72f4336c0b839073ef3815dfa23a2de9226628b02d943a36803ff9263fad90208141df96d51ccec44a3443556f707e91ffe1aa719d4fd435289a08d919a4a74cda7c82b4ff59984422c767955b27c2bd08d77726ed4df545b937b2c50894c6e45c4896636e5c2286274975139b05100728bc96fcc4ffd5440c3c575b6e4528c3a9efdc297b3960d5a6da2f5dab3b1ae1d0698f39c6dc32f0e686eb5c40b66c0f38a83e852541c42962400000000"], 0xb8) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000000)={0x0, 0x14a, 0x5, 0x3}, 0x10) r6 = socket$inet6(0xa, 0x3, 0xa) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x10000, 0x18002) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r7, &(0x7f00000001c0)=0x202, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') ptrace$setregset(0x4205, r1, 0x1, &(0x7f0000000040)={&(0x7f0000000680)="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", 0x1b7}) 17:28:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="81000000da4c18c464ec475700"/25, @ANYRES16=r2, @ANYBLOB="3f02000000000000000001000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x44102000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r2, 0x800, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x20, 0x17, {0xd, 0x1, @l2={'ib', 0x3a, 'veth0_to_bond\x00'}}}}, ["", ""]}, 0x3c}}, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74b47888318b04aeb0747555ba16ea10e6ddb915ceb6397e514f3482ca3c22e31ebc6da732ee3d854a1d3b9b3c0887a22cf550250fc7204eab731195732ecdfaf9fb6e05", 0x77}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000400)={{0x0, 0x1, 0x7f, 0x0, 0x2ba6}, 0x7, 0x4, 0x7fff}) ptrace$cont(0x18, r3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r8, 0x100, 0x70bd26, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x81c}, 0x2008080) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x9}, &(0x7f00000004c0)=0x8) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) 17:28:43 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x1) 17:28:43 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x2000000000000021, 0x2, 0x1000000000000a) connect$rxrpc(r1, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d642fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0add5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c39f0825e35fe206f244ad5247c752dbe0ad164bda538a624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db"], 0x18}}], 0x40000000000037b, 0xc000) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) dup2(r0, r1) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)='bridge_slave_1\x00', 0x6, 0x100, 0x5}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000040)=0x5) [ 139.984664] audit: type=1400 audit(1569000523.139:43): avc: denied { create } for pid=7267 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 17:28:43 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x1) 17:28:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c100100626f6e64000000000c0002000800080000000000394b5ecfa9409fcf6265a8e690617a38a40159f8a092dd8947e439f22c4e"], 0x3c}}, 0x0) 17:28:43 executing program 5: syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x2000000000000021, 0x2, 0x1000000000000a) connect$rxrpc(r1, &(0x7f00000001c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001000000434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d642fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0add5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c39f0825e35fe206f244ad5247c752dbe0ad164bda538a624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db"], 0x18}}], 0x40000000000037b, 0xc000) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) dup2(r0, r1) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e24, @loopback}, 0x4, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)='bridge_slave_1\x00', 0x6, 0x100, 0x5}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000040)=0x5) [ 140.072156] mkiss: ax0: crc mode is auto. 17:28:43 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="30000002000000ebffffffffffffff00048d1a3bc7c2bc9d493ae3075d2204fa261bcc5a89ffc0085d453958a5"], 0x2d}}], 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x1) [ 140.119285] audit: type=1400 audit(1569000523.149:44): avc: denied { write } for pid=7267 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 140.146583] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 17:28:43 executing program 5: socket(0x10, 0x80002, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x220a80, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000080)=0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/4\x00') exit(0x0) pread64(r1, 0x0, 0x14e, 0xa) [ 140.200482] audit: type=1400 audit(1569000523.199:45): avc: denied { read } for pid=7266 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 17:28:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000140)=0x400000000008000, 0xff0d) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040)=0xcc, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x360, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x1) 17:28:43 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom, 0x1}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @null, @bcast, @rose, @remote, @default]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup2(r1, r0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x3, &(0x7f0000000180)=[{&(0x7f0000000080)="da7e8ad91a82a4e312bb3d756445771d86722d7539b02767bbbd0dd623753efc6090927e038f8e2431917f5082eb94fb95b73f4aff972d4fb2da4de1258c7b7a60ed", 0xfffffffffffffd22, 0x80000001}, {&(0x7f0000000100)="9b08c47f704f4a7659a4e4104d371d52c5005b0ae9d36f9f86f81c", 0x1b, 0xffffffff}, {&(0x7f0000000140)="f8eaaadc446a5063da7fb7b07111b4bbb588f68bcfed8c124a2f792ef7d0281de2542dff6add893d2c25a2448634d37f274b0f46785a266b4862e189c755885a", 0x3d1, 0x5}], 0x250008, &(0x7f0000000280)='em0}.\x00') 17:28:46 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x400, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x5) ioctl$TIOCSETD(r1, 0x5412, &(0x7f00000000c0)=0xffffffdb) r2 = dup(r1) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000100)={r0, 0x5, 0x0, "ba20537eb56cf327b2555e12794c760f8bcf350be69c90697e492b4ff61ca113c25282b9ac7791ee3c18611798bdef7c0e364aeddd27b0d84f334b9d8cc4b78100976773d378a4b08711bdb8922c388eabe7759972d9e79bf0de0de7de18940b9efaede99c2a52f8e2b050a2166a74d005b72b144e0632eb34a97c349cfcefc62e71f96e491743330e"}) bind$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) 17:28:46 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="30000002000000ebffffffffffffff00048d1a3bc7c2bc9d493ae3075d2204fa261bcc5a89ffc0085d453958a5"], 0x2d}}], 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x1) 17:28:46 executing program 2: r0 = epoll_create1(0xcf3b0b9aa7fc4ab2) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) epoll_wait(r0, 0x0, 0xc1, 0x7f) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x5) ioctl$TIOCSETD(r2, 0x5412, &(0x7f00000000c0)=0xffffffdb) fcntl$getownex(r2, 0x10, &(0x7f0000000240)) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000000c0)={0x3, 0x4, 0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000440)={0x7}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r4, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x7, "2c798ead07c81c53b62e83fc5ffa86a7f8d1581410d35db079316de584246a4c", 0x3, 0x8, 0x4, 0x3b, 0x2, 0x8d, 0x74bc, 0x5, [0xd1, 0x5, 0x100000000, 0xdd4]}) 17:28:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="05000000000000007110b0100000000095000000000000000925edeaeb5e4490942c97541de0fa06630893"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x8, 0x10}, 0xc) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x404000, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x3}}]}, 0x30}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xe, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ef3}, [@ldst={0x0, 0x2, 0x6, 0xc, 0x6, 0xfffffffffffffff8, 0xfffffffffffffffe}, @ldst={0x0, 0x1, 0x4, 0x0, 0x2, 0x4}, @generic={0x4, 0x2000000000, 0x1, 0x800, 0x1}, @map={0x18, 0x8, 0x1, 0x0, r0}, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1f}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x628, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000300)='syzkaller\x00', 0x10001, 0x27, &(0x7f0000000340)=""/39, 0x0, 0x7, [], r5, 0x0, r6, 0x8, &(0x7f0000000380)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x10, 0x7ff00, 0x4}, 0x10}, 0x70) socket$nl_netfilter(0x10, 0x3, 0xc) 17:28:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYPTR64], 0x8) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="9ddd731322fecda3fc7a675473fcd840b3642e92ba3c80bedf19d4a1718632800e665268ed3629e49d92c1a6f180fa66e608e502081f51cdd4fc"], 0x1) recvmmsg(r1, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x6, 0x0) 17:28:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200), 0x14) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000000)={0xfffffffffffffffd, 0x5, 0x0, [{0x6, 0x20, 0x80000001, 0xdc, 0x2, 0xff, 0x8}, {0x3, 0x10000, 0x6, 0xffffffffffffffb4, 0x80, 0x40, 0x8001}, {0xd60, 0x80000001, 0x317f, 0x3, 0x200, 0x1, 0xff}, {0x3e, 0x0, 0x22f, 0x40, 0xec8b, 0x136, 0x100000000000000}, {0x24, 0x80000001, 0x10001, 0xff, 0x5, 0x3, 0x3f}]}) 17:28:46 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="30000002000000ebffffffffffffff00048d1a3bc7c2bc9d493ae3075d2204fa261bcc5a89ffc0085d453958a5"], 0x2d}}], 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x1) 17:28:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x347e8f04bd932f4d, 0x0) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/182) [ 143.069449] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 143.092600] mkiss: ax0: crc mode is auto. [ 143.105787] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 17:28:46 executing program 4: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed008d46", 0xce) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB="30000002000000ebffffffffffffff00048d1a3bc7c2bc9d493ae3075d2204fa261bcc5a89ffc0085d453958a5"], 0x2d}}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x1) [ 143.161915] mkiss: ax0: crc mode is auto. 17:28:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x3, 0xc0b, 0x435) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000080)=0x4) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) mmap(&(0x7f0000087000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\b', 0x175d900f) socket$pppoe(0x18, 0x1, 0x0) 17:28:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x7) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'dummy0\x00', 0x0}) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3dd, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="3800000013000100"/20, @ANYRES32=r1, @ANYBLOB="000000000000000018001600140001001000060000d895a90e4a5c5a99000000"], 0x38}}, 0x0) [ 143.255804] mkiss: ax1: crc mode is auto. [ 143.282682] BUG: unable to handle kernel paging request at fffffff7e60c400c [ 143.289837] IP: dummy_set_vf_rate+0x99/0x110 [ 143.294236] PGD 766d067 P4D 766d067 PUD 0 [ 143.298471] Oops: 0002 [#1] PREEMPT SMP KASAN [ 143.302951] Modules linked in: [ 143.306136] CPU: 1 PID: 7386 Comm: syz-executor.0 Not tainted 4.14.145 #0 [ 143.313059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.322496] task: ffff888081476180 task.stack: ffff88805aab8000 [ 143.328548] RIP: 0010:dummy_set_vf_rate+0x99/0x110 [ 143.333459] RSP: 0018:ffff88805aabf2a0 EFLAGS: 00010246 [ 143.338807] RAX: dffffc0000000000 RBX: fffffff7e60c4000 RCX: ffffc90007649000 [ 143.346071] RDX: 0000000000000000 RSI: ffffffff83a48c5f RDI: fffffff7e60c400c [ 143.353329] RBP: ffff88805aabf2c8 R08: 1ffff1100b557e99 R09: ffff88805aabf4c8 [ 143.360603] R10: ffffed100b557ea5 R11: ffff88805aabf52f R12: ffff888066b8e7c0 [ 143.367859] R13: 0000000000000099 R14: 000000005a5c4a0e R15: fffffff7e60c4000 [ 143.375113] FS: 00007fb7dee27700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 143.383322] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 143.389190] CR2: fffffff7e60c400c CR3: 0000000081fdb000 CR4: 00000000001406e0 [ 143.396444] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 143.403698] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 143.410951] Call Trace: [ 143.413528] do_setlink+0x1755/0x2d50 [ 143.417316] ? dummy_set_vf_vlan+0x180/0x180 [ 143.421712] ? rtnl_register+0x50/0x50 [ 143.425586] ? is_bpf_text_address+0xa6/0x120 [ 143.430074] ? trace_hardirqs_on+0x10/0x10 [ 143.434295] ? trace_hardirqs_on+0x10/0x10 [ 143.438512] ? save_trace+0x290/0x290 [ 143.442300] ? __lock_acquire+0x5f7/0x4620 [ 143.446519] ? find_held_lock+0x35/0x130 [ 143.450562] ? avc_has_perm_noaudit+0x28b/0x420 [ 143.455250] ? nla_parse+0x186/0x240 [ 143.458949] rtnl_setlink+0x225/0x320 [ 143.462736] ? do_setlink+0x2d50/0x2d50 [ 143.466696] ? lock_acquire+0x16f/0x430 [ 143.470655] ? rtnetlink_rcv_msg+0x33a/0xb70 [ 143.475756] ? graph_lock+0x18/0x170 [ 143.479455] ? do_setlink+0x2d50/0x2d50 [ 143.483413] rtnetlink_rcv_msg+0x3eb/0xb70 [ 143.487633] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 143.492205] ? netlink_deliver_tap+0x93/0x8f0 [ 143.496687] netlink_rcv_skb+0x14f/0x3c0 [ 143.500732] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 143.505301] ? lock_downgrade+0x6e0/0x6e0 [ 143.509432] ? netlink_ack+0x9a0/0x9a0 [ 143.513308] ? netlink_deliver_tap+0xba/0x8f0 [ 143.517792] rtnetlink_rcv+0x1d/0x30 [ 143.521493] netlink_unicast+0x45d/0x640 [ 143.525539] ? netlink_attachskb+0x6a0/0x6a0 [ 143.529933] ? security_netlink_send+0x81/0xb0 [ 143.534501] netlink_sendmsg+0x7c4/0xc60 [ 143.538549] ? netlink_unicast+0x640/0x640 [ 143.542770] ? security_socket_sendmsg+0x89/0xb0 [ 143.547508] ? netlink_unicast+0x640/0x640 [ 143.551728] sock_sendmsg+0xce/0x110 [ 143.555426] ___sys_sendmsg+0x70a/0x840 [ 143.559386] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 143.564127] ? __fget+0x210/0x370 [ 143.567589] ? find_held_lock+0x35/0x130 [ 143.571640] ? __fget+0x210/0x370 [ 143.578034] ? lock_downgrade+0x6e0/0x6e0 [ 143.582184] ? __fget+0x237/0x370 [ 143.585623] ? __fget_light+0x172/0x1f0 [ 143.589581] ? __fdget+0x1b/0x20 [ 143.592933] ? sockfd_lookup_light+0xb4/0x160 [ 143.597414] __sys_sendmsg+0xb9/0x140 [ 143.601198] ? SyS_shutdown+0x170/0x170 [ 143.605156] ? put_timespec64+0xb4/0x100 [ 143.609206] ? SyS_clock_gettime+0xf8/0x180 [ 143.613516] SyS_sendmsg+0x2d/0x50 [ 143.617044] ? __sys_sendmsg+0x140/0x140 [ 143.621093] do_syscall_64+0x1e8/0x640 [ 143.625181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 143.630015] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 143.635219] RIP: 0033:0x459a09 [ 143.638395] RSP: 002b:00007fb7dee26c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 143.646196] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 143.653450] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000003 [ 143.661311] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 143.668565] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb7dee276d4 [ 143.675834] R13: 00000000004c7922 R14: 00000000004dd310 R15: 00000000ffffffff [ 143.683091] Code: df 49 8d 7f 0c 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 04 84 d2 75 52 48 b8 00 00 00 00 00 fc ff df <66> 45 89 77 0c 49 03 9c 24 c0 0a 00 00 48 8d 7b 0e 48 89 fa 48 [ 143.702340] RIP: dummy_set_vf_rate+0x99/0x110 RSP: ffff88805aabf2a0 [ 143.708727] CR2: fffffff7e60c400c [ 143.712167] ---[ end trace 31117da27ad5b992 ]--- [ 143.716908] Kernel panic - not syncing: Fatal exception [ 143.723389] Kernel Offset: disabled [ 143.727009] Rebooting in 86400 seconds..