Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.322518] audit: type=1800 audit(1571637661.831:33): pid=7221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 37.346710] audit: type=1800 audit(1571637661.841:34): pid=7221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 40.021684] audit: type=1400 audit(1571637664.531:35): avc: denied { map } for pid=7397 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.12' (ECDSA) to the list of known hosts. 2019/10/21 06:01:11 fuzzer started [ 46.578838] audit: type=1400 audit(1571637671.091:36): avc: denied { map } for pid=7407 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/21 06:01:12 dialing manager at 10.128.0.105:38533 2019/10/21 06:01:12 syscalls: 2516 2019/10/21 06:01:12 code coverage: enabled 2019/10/21 06:01:12 comparison tracing: enabled 2019/10/21 06:01:12 extra coverage: extra coverage is not supported by the kernel 2019/10/21 06:01:12 setuid sandbox: enabled 2019/10/21 06:01:12 namespace sandbox: enabled 2019/10/21 06:01:12 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/21 06:01:12 fault injection: enabled 2019/10/21 06:01:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/21 06:01:12 net packet injection: enabled 2019/10/21 06:01:12 net device setup: enabled 2019/10/21 06:01:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 06:03:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) accept4$inet6(r0, 0x0, &(0x7f00000000c0), 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fstatfs(r2, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000280, 0x0) [ 192.017002] audit: type=1400 audit(1571637816.531:37): avc: denied { map } for pid=7424 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14987 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 192.133080] IPVS: ftp: loaded support on port[0] = 21 06:03:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x216, 0x210007fd, &(0x7f0000000380)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f0000000540)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x8200, 0x2, 0x0, 0x204) [ 192.282173] chnl_net:caif_netlink_parms(): no params data found [ 192.332453] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.336176] IPVS: ftp: loaded support on port[0] = 21 [ 192.340118] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.351695] device bridge_slave_0 entered promiscuous mode [ 192.360631] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.367162] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.374511] device bridge_slave_1 entered promiscuous mode [ 192.401419] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 192.428704] bond0: Enslaving bond_slave_1 as an active interface with an up link 06:03:37 executing program 2: creat(&(0x7f00000002c0)='./bus\x00', 0x0) getxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)=@random={'trusted.', '\x00'}, 0x0, 0x0) [ 192.450644] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 192.458484] team0: Port device team_slave_0 added [ 192.468478] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 192.486782] team0: Port device team_slave_1 added [ 192.508708] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 192.559904] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 06:03:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1f}, 0x1c) [ 192.647693] device hsr_slave_0 entered promiscuous mode [ 192.685138] device hsr_slave_1 entered promiscuous mode [ 192.725387] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 192.732738] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 192.769371] chnl_net:caif_netlink_parms(): no params data found [ 192.773807] IPVS: ftp: loaded support on port[0] = 21 [ 192.791769] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.798306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.805223] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.811590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.887008] IPVS: ftp: loaded support on port[0] = 21 [ 192.928576] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.935867] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.943285] device bridge_slave_0 entered promiscuous mode [ 192.963118] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 192.971811] 8021q: adding VLAN 0 to HW filter on device bond0 06:03:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)=@builtin='builtin_trusted\x00') [ 192.989036] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.999903] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.017540] device bridge_slave_1 entered promiscuous mode [ 193.048178] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 193.122540] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.148525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.162940] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.189922] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.199394] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 193.217012] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 193.223120] 8021q: adding VLAN 0 to HW filter on device team0 06:03:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 193.235086] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.258310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.269761] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.276190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.283822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.293903] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.300314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.313073] chnl_net:caif_netlink_parms(): no params data found [ 193.339389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 193.370753] IPVS: ftp: loaded support on port[0] = 21 [ 193.382480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.391770] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 193.399262] team0: Port device team_slave_0 added [ 193.415949] IPVS: ftp: loaded support on port[0] = 21 [ 193.437992] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 193.445738] team0: Port device team_slave_1 added [ 193.451676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 193.491069] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 193.499119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.524043] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.530570] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.537960] device bridge_slave_0 entered promiscuous mode [ 193.544476] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 193.597138] device hsr_slave_0 entered promiscuous mode [ 193.636002] device hsr_slave_1 entered promiscuous mode [ 193.677076] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 193.688484] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 193.698220] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.704578] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.712569] device bridge_slave_1 entered promiscuous mode [ 193.727571] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 193.738051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.746220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.756135] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.763244] chnl_net:caif_netlink_parms(): no params data found [ 193.791947] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 193.808986] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 193.824367] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 193.840330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.848771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.857210] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 193.868284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 193.887787] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 193.895949] team0: Port device team_slave_0 added [ 193.901671] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 193.909402] team0: Port device team_slave_1 added [ 193.918885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.926424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.936312] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 193.957038] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 193.964562] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 193.980509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.989907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.001479] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 194.008555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.076743] device hsr_slave_0 entered promiscuous mode [ 194.125141] device hsr_slave_1 entered promiscuous mode [ 194.166868] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 194.180324] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 194.189627] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.196284] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.203447] device bridge_slave_0 entered promiscuous mode [ 194.211748] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.218882] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.226158] device bridge_slave_1 entered promiscuous mode [ 194.257672] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 194.313340] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.322760] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.334153] chnl_net:caif_netlink_parms(): no params data found [ 194.346820] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 194.360275] chnl_net:caif_netlink_parms(): no params data found [ 194.389532] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.401242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.422172] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 194.430071] team0: Port device team_slave_0 added [ 194.438541] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 194.445434] audit: type=1400 audit(1571637818.951:38): avc: denied { associate } for pid=7425 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 194.469455] team0: Port device team_slave_1 added [ 194.475875] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 194.485214] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 194.522829] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 194.536005] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 194.568876] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.576836] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.584096] device bridge_slave_0 entered promiscuous mode [ 194.591536] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.597990] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.605337] device bridge_slave_1 entered promiscuous mode [ 194.612344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.620275] hrtimer: interrupt took 26381 ns [ 194.626142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.640379] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 194.648361] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.654655] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.662345] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.670538] device bridge_slave_0 entered promiscuous mode [ 194.683286] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.689855] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.702888] device bridge_slave_1 entered promiscuous mode [ 194.772202] device hsr_slave_0 entered promiscuous mode [ 194.815259] device hsr_slave_1 entered promiscuous mode [ 194.857388] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 194.866035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.873809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.881715] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.888137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.907529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.923539] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.932040] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 194.942090] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 194.965803] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.976377] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.986563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.994689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.002802] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.009241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.017559] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 195.026956] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 195.042520] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.057991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.075457] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 195.083181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 195.113000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.148539] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.163344] team0: Port device team_slave_0 added [ 195.170449] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.185343] team0: Port device team_slave_1 added [ 195.191197] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 195.200181] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 195.208299] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.217027] team0: Port device team_slave_0 added [ 195.233119] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.267185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.275777] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.283828] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 195.293571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 195.306910] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.317902] team0: Port device team_slave_1 added [ 195.324274] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 195.338203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 195.353281] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.361145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 06:03:39 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000340)=""/200) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x801}]}, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f0000001740)='cgroup.threads\x00', 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = msgget$private(0x0, 0x1) msgctl$IPC_RMID(r10, 0x0) msgctl$MSG_STAT(r10, 0xb, &(0x7f00000002c0)=""/43) r11 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x3, 0x2) sendfile(r9, r8, &(0x7f0000001700)=0x5, 0x7ff) ioctl$PPPIOCGMRU(r11, 0x80047453, &(0x7f0000000280)) write$binfmt_misc(r1, &(0x7f0000001480)=ANY=[@ANYRES16=r1, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRESDEC=r2, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESHEX=r5, @ANYPTR=&(0x7f00000015c0)=ANY=[@ANYRESOCT=r9, @ANYRESOCT, @ANYRESDEC=0x0, @ANYPTR, @ANYRESHEX, @ANYBLOB="35c7dc11c7cf3e2bf2a859cf92c67ba74109fbeafe35db4f2482eba2934f2ef1435c7242038096427d27d996ad8b93fb07cb7bf0bb30d94b11a1b9051a117d6d535759883b56927b406d34b72b95ad9386a8fc99ff804a8936f76fb9d7b507c9092edd754f0db1da7bf15b624e168365e06f902c2d23f7edfe1cc0153dcd2c1dbf36dc742b468799838cbcb5b27a3b661d86326da8f5a6973db00387a7f30b44c41cd359bcc3d9fe17d60e3507df6353fe6ca96113820e5806a35fcbfe38b6ec955d42088c31163270a3c57c5b8b6ab76488495be3853bb02d1387fd7402b405be26"]], @ANYRESHEX, @ANYRES64=r6, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r0], @ANYBLOB="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"], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="a7f530e11e274a4043a014663b46848dfbb87f892b6b46cf94ecbb59419045f7"], @ANYRESDEC, @ANYRES64=r1, @ANYRESHEX=r7, @ANYBLOB="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"], 0x13f) bind$inet(r5, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) [ 195.374600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.414593] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 195.425575] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 195.433871] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 195.448790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.457453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.465793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.472802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.527594] device hsr_slave_0 entered promiscuous mode [ 195.585540] device hsr_slave_1 entered promiscuous mode 06:03:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffffb1, 0x0, 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selanu\b\x00statu3\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000140)=0x6, 0x4) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = dup2(r4, r4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) close(r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f0000000000)={0x0, 0x0, 0x7}) ioctl$KVM_NMI(r2, 0xae9a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r8, 0xc058534b, &(0x7f0000000300)={0x7, 0x2, 0x1f, 0x470, 0x200, 0x6}) bind$ax25(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@ccm_128={{}, "6134a73e6ebe7911", "770367a2bde0cefe312000", "4c24daa2", "2900b9000400"}, 0x28) r9 = socket$inet(0x2, 0x4000000000000001, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f0000000380)='./file0\x00', 0x8, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x8955, &(0x7f0000000000)=0x2) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2c0040, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) unlinkat(r11, &(0x7f00000003c0)='./file0\x00', 0x0) [ 195.646969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 195.658085] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 195.664209] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.711967] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 195.739689] device hsr_slave_0 entered promiscuous mode [ 195.795235] device hsr_slave_1 entered promiscuous mode [ 195.845750] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 195.853150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 195.860577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.868565] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.877876] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 195.883884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.894852] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 195.902406] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 195.923938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 195.939300] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 195.953221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.964335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.972177] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.978587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.993411] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 06:03:40 executing program 0: bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getitimer(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f00000002c0)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x141000, 0x0) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x4e20, 0x81, @rand_addr="1d054794bc6ec7558bd8de4fe396ba20", 0x9}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 196.012307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.022936] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 196.033808] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.055847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.069455] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.078065] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.084434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.094992] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 196.104302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 196.105037] protocol 88fb is buggy, dev hsr_slave_0 [ 196.114224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 196.116354] protocol 88fb is buggy, dev hsr_slave_1 [ 196.126040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 196.138434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 196.154508] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 196.163888] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 196.180037] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.191518] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 196.211679] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 196.229926] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.244823] protocol 88fb is buggy, dev hsr_slave_0 [ 196.249925] protocol 88fb is buggy, dev hsr_slave_1 [ 196.251212] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 196.290636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.303661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.317917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.329206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.342299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.353411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.368040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.378709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.389899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.400841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.411974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.423890] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.434582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.458080] protocol 88fb is buggy, dev hsr_slave_0 [ 196.515337] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 196.534452] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 06:03:41 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6572726fdbaede82f06f503ce00a695c75652c00"/30]) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000180)) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000280)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000380)=0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RMKNOD(r3, &(0x7f00000000c0)={0x14, 0x13, 0x2, {0x41, 0x4, 0x5}}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) [ 196.560111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.601223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.632739] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 06:03:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x2c, 0x4}, [@ldst={0x4, 0x0, 0x2, 0x0, 0x7}]}, &(0x7f0000003ff6)='G\x00', 0x3, 0xd3, &(0x7f00000001c0)=""/211, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x70) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r2 = getpgrp(r1) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x4, 0x7fff, r2, 0x0, r3, 0x0, 0xfff, 0x2}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3aa4, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140), 0x0, 0x5}, {&(0x7f0000000180), 0x0, 0x10000}, {&(0x7f00000002c0)="f68368006c8ad096b2f015ef919fd1be8fdd9cde1fcc06d98ad97869a99595d43bb4a0da2fbd8787a9d33f0bd8", 0x2d, 0x4}], 0x1212006, &(0x7f0000000500)={[{@space_cache='space_cache'}, {@nodiscard='nodiscard'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@euid_lt={'euid<', r3}}, {@uid_eq={'uid', 0x3d, r4}}]}) [ 196.648251] FAT-fs (loop0): Unrecognized mount option "erroۮނoP< [ 196.648251] i\ue" or missing value [ 196.659144] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.729513] FAT-fs (loop0): Unrecognized mount option "erroۮނoP< [ 196.729513] i\ue" or missing value [ 196.749865] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 196.768683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 06:03:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x7c, &(0x7f0000000000)={r4}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r4, &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r5, @in6={{0xa, 0x4e24, 0x8, @mcast1}}}, &(0x7f0000000240)=0x84) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="040100001000070d26bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="2040000000000000dc0012000c0001006970366772650000cc00020014000700fe8000000000000000000000000000aa14000700fe8800000000000000000000000001011400060000000000000000000000ffffffffffff1400070000000000e0ffffff000000000000000108000100", @ANYRES32=0x0, @ANYBLOB="08070000000000000800140033060000080010004e2000000800020000000000140007000f79138a0000000000000000aa08000100000000", @ANYRES32=0x0, @ANYBLOB="08000f0005000000080013000000000008000800ff000000080011004e230000080017000168a3972000040004001200080011004e22000008000a0071c3", @ANYRES32=0x0], 0x104}}, 0x0) socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = eventfd(0x79d6) fcntl$dupfd(r8, 0x0, r9) r10 = dup(r7) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$sock_rose_SIOCADDRT(r13, 0x890b, &(0x7f0000000a00)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x8, [@default, @null, @null, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}) vmsplice(r11, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r11, 0x0, 0x60, &(0x7f0000000400)={'filter\x00', 0x7, 0x4, 0x580, 0x280, 0x140, 0x0, 0x498, 0x498, 0x498, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x18}, @mac=@link_local, @loopback, @remote, 0x916761fb50e3ab60}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @loopback, @loopback, 0x2}}}, {{@arp={@loopback, @empty, 0xffffff00, 0xffffffff, @empty, {[0xff]}, @empty, {[0x0, 0xff, 0x1fe, 0xff, 0x80]}, 0x4, 0xdf96, 0x7, 0x4, 0x81, 0x7f, 'veth1_to_bond\x00', 'team_slave_1\x00', {0x7f}, {}, 0x0, 0x26d}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x800, 'system_u:object_r:var_spool_t:s0\x00'}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5d0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) recvmmsg(r10, &(0x7f00000072c0), 0x120, 0x80010020, 0x0) [ 196.781130] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.822061] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.828662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.862691] 8021q: adding VLAN 0 to HW filter on device bond0 06:03:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000200)={0x8, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b6300000c63000002016c5fe13958ec77e002421cdbb9723e8a25c27735732d21a9f3f90ad2baa18fb8705ebee8e0d479feaffdfb922f4ac159f4d91f5303fb7492f2c0d1a9a3a5742dd2a1eae2680b5862a52a1e5d5d95fb665d9a838eb76e65a1521f99281133029abf1f7bf01199fae3593bc2"], 0x0, 0x0, 0x0}) r4 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xffffffffffffff64, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800000000000014001600fe8000000000000000000000000000aa"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 196.908472] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 196.933298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 06:03:41 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x28001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r5 = accept$alg(r3, 0x0, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f00000002c0)='bpq0\x00') ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000001c0)={0xeec0, 0xb, 0x4, 0x400, {0x77359400}, {0x1, 0x1, 0xf8, 0x8, 0x0, 0x3f, "203d0090"}, 0x8, 0x2, @offset, 0x4}) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x7c, &(0x7f0000000000)={r6}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000040)={r6, 0x6, 0x10, 0x621, 0x2}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)={r7}, &(0x7f0000000140)=0x8) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000240)=@assoc_value, &(0x7f0000000280)=0x8) [ 196.953047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.972684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.976329] audit: type=1400 audit(1571637821.491:39): avc: denied { create } for pid=7499 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 196.981137] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.010382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.022285] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 197.024862] audit: type=1400 audit(1571637821.531:40): avc: denied { write } for pid=7499 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:03:41 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6271ff4dd122c5ba9621c75568f9b400000000f3ff00"], 0x2) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 197.033339] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. [ 197.069952] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 197.080039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.102550] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 197.131406] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 197.157226] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 197.171004] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 197.179834] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.195568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.203508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.213474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.222058] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.239622] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 197.252873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 197.268524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 197.282807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.301852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.310202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.323540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.331724] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.338147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.348237] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 197.355737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.362732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.370227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.377407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.386760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 197.394706] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 197.401445] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.408873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.416699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.424183] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.430652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.440884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.453945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 197.463003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.471065] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.480157] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.488188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.496536] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.502997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.511697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 197.521133] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 197.529282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.536682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.544340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.553240] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 197.562413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 197.571525] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 197.582208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.590792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.598792] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.605206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.612034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.619810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.627333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.635484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.643281] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.652736] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 197.663539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.671146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.680025] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.689424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.697331] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.707814] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 197.713843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.723074] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 197.732238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 197.745451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.753199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.761164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.773357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 197.787139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 197.795404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.802878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.810446] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.820103] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 197.827499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.835335] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 197.844116] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 197.856786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.864486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.873512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.883428] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 197.891664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.900157] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.911132] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 197.923111] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.930726] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 197.944332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.952177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.962383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 197.970954] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.986839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.994403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.004123] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 198.010480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.032276] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 198.046635] 8021q: adding VLAN 0 to HW filter on device batadv0 06:03:42 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r7, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000900)=ANY=[@ANYBLOB="44030000", @ANYRES16=r8, @ANYBLOB="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"/831], 0x344}, 0x1, 0x0, 0x0, 0x40000}, 0x840) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, &(0x7f0000003ff6)='OPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff4b, 0x10, 0x0, 0x2d8}, 0x70) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x8200}]) 06:03:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x1c9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140)={0x1}, 0x2ce) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) close(r0) pread64(r0, &(0x7f0000000180)=""/136, 0x88, 0x0) connect$netrom(0xffffffffffffffff, &(0x7f0000000240)={{0x3, @default, 0x1}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x1ad) 06:03:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x7) r1 = mq_open(&(0x7f0000000000)='/dev/ptmx\x00', 0x40, 0x52, &(0x7f0000000080)={0x5, 0xe27, 0xc54d, 0x4, 0x58, 0x20, 0x5, 0x6}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x51) ioctl$KDADDIO(r0, 0x5412, 0x718000) 06:03:42 executing program 0: socket$pptp(0x18, 0x1, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x24, r7, 0x11, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="04002dbd7000fbdbdf25010000000000000008410000004c00180000000473797a310000000000000000000000000000000000000000000000000000000000000000000000000000000600"/98], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$SG_GET_VERSION_NUM(r5, 0x2282, &(0x7f00000001c0)) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x50, r8, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0x9}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, '\nblcr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000c00}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0xbc, r8, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffff52}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x280}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x10}, 0x80) r9 = gettid() fcntl$setown(r1, 0x8, r9) 06:03:42 executing program 5: pipe2(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0c37711a00000000"], 0x200600) r2 = getpid() ptrace(0x4206, r2) ptrace$getregset(0x4205, r2, 0x2, &(0x7f0000000000)={0x0}) write$P9_RGETLOCK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="290000003701000001000000000000000100000000000000", @ANYRES32=r2, @ANYBLOB="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"], 0x29) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x1000, 0x40000) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000240)) pipe(0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x9, 0xc7, 0x80000000}]}, 0x10) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 06:03:42 executing program 3: openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x408040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000180)={0x3, 0xd1, "dbda5c29b24c1df62fa80d479ce9afac8efb06f0e3b97a19c8b7d6cbca75547a001b1750c971de73e56196d5c755b851af35eca9bfbef7efc132200c26b28136ccda0494699c96fb71f7075eaa9405c089306135aefe9cb64817403afe1847dd3be29316d6a4a521504462661db38d1a6da91e926417afe052b577c8a80c944852bf15205f5d217667f2ef885d28c4d9a2ee696125d5e9ed0f5b7e9cb50eb2f62f4a15451da25ed0f2fc6e4d0b29f83fc41a6c25d2806fb4743b035becd6eb025a24843b41bb0fb89b6403e731eb510489"}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000040)='vlan0\x00') accept4(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0) gettid() creat(0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)={0xb}, 0xb) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xe000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x0, 0x6000}}}}}}, 0x0) getresuid(&(0x7f0000000140), 0x0, &(0x7f0000000380)) [ 198.332741] audit: type=1400 audit(1571637822.841:41): avc: denied { read } for pid=7529 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 198.364512] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 198.383697] sp0: Synchronizing with TNC 06:03:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @local}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={@rand_addr="0440a39ec26a3dbfef28423f580203f7", 0x46, r3}) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) r5 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x200200) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 06:03:43 executing program 3: getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x9, 0x0, 0x1f, 0x7}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000000)=0x3) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) [ 198.525891] IPVS: Scheduler module ip_vs_ [ 198.525891] blcr not found [ 198.641142] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 198.691155] sp0: Synchronizing with TNC 06:03:43 executing program 4: syz_open_dev$vcsn(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000003031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000000)={'teql0\x00', 0x1}) dup2(0xffffffffffffffff, r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000001340)=ANY=[@ANYRES32=0x0, @ANYRES32]) [ 198.759422] IPVS: Scheduler module ip_vs_ [ 198.759422] blcr not found [ 198.877599] audit: type=1400 audit(1571637823.391:42): avc: denied { create } for pid=7578 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 06:03:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridedslw\xb5e_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={@rand_addr="a6ac30405bd92f9bea3c5597afc948ee", 0x0, r3}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000005c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1, r3}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 199.119638] audit: type=1400 audit(1571637823.531:43): avc: denied { write } for pid=7578 comm="syz-executor.4" path="socket:[28796]" dev="sockfs" ino=28796 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 06:03:43 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000080)={0x0, 0x1f, 0x3, 0x2c0554409ce76276, &(0x7f0000fff000/0x1000)=nil, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setrlimit(0x9, &(0x7f0000000180)={0x0, 0x8000}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 06:03:43 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0xb9347e7e726a7f2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000100)=""/112) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000000040), &(0x7f0000000080)=0x4) 06:03:43 executing program 2: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r1 = socket(0x15, 0x80005, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x3) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000200)={0x0, 0x8, 0x4, {0x1, @raw_data="8a92b6ffc5892ed9c1d88c47c251b12d26aa9f91bd640c35f800f4f06178740c6a640c777e68d791682d1b8c3355fe9850ca914df268bb6ebac006a9fde4a056bb4147cfbeea271bd217ca8b18509a4ade4981035ec826dc5f9694e42b6190768e36281149a4e28aa5e190d3345253012cdb5bf8b9f3916713db9bc55c9c82e00a680a0afd0af24f208331b431299d72902d93db96299b558d1f2a9ba7d592a68bba32cfe75ef5c8298a553670e2674f0703c248c440ff04825710705c69cc8c2e95d94c02effd0d"}}) getcwd(&(0x7f00000004c0)=""/106, 0x6a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = accept4$tipc(r8, &(0x7f00000003c0)=@name, &(0x7f0000000400)=0xfffffffe, 0x80000) getsockopt$IP_VS_SO_GET_VERSION(r9, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/relabel\x00', 0x2, 0x0) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7c, &(0x7f0000000000)={r11}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000100)={r11, 0x10, &(0x7f0000000080)=[@in={0x2, 0x4e23, @local}]}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000300)={r12, 0x9, 0x9d, "ec01340f2d40f29a6acf14ff907e7a4f7e3994e0d9d0d0e2f90465bf1ebd9039ec260e6555316afb74375f8da683ac90ab244a643d2bde3827180b30beeb9f3aafb02859caa99c677e858dadcc9b85381e20f0fd78c35028cb2ed5bc06f87d55f50ff48e03c5fc969de68eee4b37fe17ee1864453964f1370d397b1fc48fda81880f0c13876b4bf60ef9d08af86c129bdff01662bb8f90671438435592"}, 0xa5) r13 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFBRDADDR(r13, 0x8919, &(0x7f0000000000)={'vxcan1\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) 06:03:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000eaff0f00eaff0f0049030000000000000000000ad2ff0f000000000000000005000000000000000000000000000000000000000000000007020000cc4da4670f9d00000000000000000604000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x0, 0x10034b}, 0x3b) close(r1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x400202, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r3) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000340)=0x4000) dup(r2) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) io_getevents(0x0, 0x3, 0xa, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000300)={r4, r5+10000000}) 06:03:44 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0xfffffffffffffd05}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x8, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x2d, 0xffffffa0, 0x0, 0x3}, [@map={0x18, 0xb, 0x1, 0x0, 0x1}, @generic={0x3, 0x4, 0x8, 0xcf3f, 0x4124}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000200)='GPLz', 0x5, 0xc3, &(0x7f00000006c0)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xfffffffffffffeae) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40a000, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x2) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r5}]]}}}]}, 0x38}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f00000004c0)={@local, @broadcast}, &(0x7f0000000500)=0xc) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=@newlink={0x30, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000380)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r10 = getpgrp(r9) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x4, 0x7fff, r10, 0x0, r11, 0x0, 0xfff, 0x2}) setreuid(r8, r11) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6}, 0x10) 06:03:44 executing program 3: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0xfffffffffffffffb) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) gettid() connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x7b, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "434b1a0ecccf80a7281c591244d4892e79ae7fd0a58f3388aff143ce6b75762a726d602fe6a1d4652c8151a131105792e169e2efeae0f5ec65fe9ed216e3c8e6bb29a6b4572cb0a5d5f8e59006aa0d490b32b490378f7e193ac2d080872df2439c6d39f0825e35fea624c18a685487b623389f7c277520e1a9688acb70e6d731228c09e1bd991c217faa80853aca5fd42e682037347ff1bf134fda7e128b99cfec9b1edb1b9920db3ad2f7437c0e4c2e2a00a815f1"}], 0x18}}], 0x40000000000037b, 0xc000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000040)=0x6) creat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) getuid() shmget$private(0x0, 0x1000, 0x8, &(0x7f0000ffc000/0x1000)=nil) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x810, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 06:03:44 executing program 3: memfd_create(&(0x7f0000000300)='\x0f\x02\x80\x05,\x04\xad\xe5\xba\xed\xfa\x9c:!)\xa1\ff\x9a\xeazo\xf1\tB\xd9`_\x05,g\x10KSW\x92Q\xcbo\xdfJ|\xe2\x9bc/\x13\x93-\bH=\xf3\xd1\xb6\xd98\xf5\xc9\xf4\xf8\xa5Ci\x8c\xc6\x85(7\xdc\x12,\b\xca\x88i88\n{H\xe9\x7f[\xea\'\\\x06h\xc9\x14v\x14 \xef\x12\xe5\xa9>\x1e\"\\\x9f@\x1e\xc1\xee1JJ\xa8\xb2\x15\t\xbet\x90\x92', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe000)=nil, 0xe000, 0x8, 0x12, r2, 0x3) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, 0x0, 0x0) [ 200.126176] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.160796] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 200.214818] protocol 88fb is buggy, dev hsr_slave_0 [ 200.219969] protocol 88fb is buggy, dev hsr_slave_1 06:03:44 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe2(&(0x7f0000000000), 0x188400) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x7ea56dc97597c752, 0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x4400) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x90881, 0x0) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r7, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffffe6, 0x0, 0x0, 0x0) [ 200.294815] protocol 88fb is buggy, dev hsr_slave_0 [ 200.299973] protocol 88fb is buggy, dev hsr_slave_1 06:03:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@dev}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@output_mark={0x8}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x140}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) munlockall() r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x7ee156f09060dfc6, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000000080)={0x2f, @rand_addr=0x9, 0x4e24, 0x3, 'nq\x00', 0x28, 0x6c2, 0x1c}, 0x2c) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r6, 0x6612) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0x640100, 0x0) openat(r7, &(0x7f0000000680)='./file0\x00', 0x739582, 0x8) readv(r5, &(0x7f0000000600)=[{0x0}], 0x1) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @sack_perm, @mss, @mss, @timestamp, @sack_perm], 0xeb) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) 06:03:45 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x0, 0x38) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000000)=0x0) r7 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x386f1272174f246f) perf_event_open(0x0, r6, 0x2, r7, 0x1) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 200.423741] bridge0: port 1(bridge_slave_0) entered disabled state 06:03:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) fchdir(r1) r2 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write(r2, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x41, 0x0) 06:03:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6f7265636f566572792c0012f72ff5ce56be5cf07857d7f3797a856d30009fd83be05c851bb71744df5d808aceeeb73b44a18ef81accf89c629a3a8f63c34344f039b55b998e8f562a5645d987919387605f0560da4efe00f7777e9d6e4007341a5abf85342bad54e7999c0000000000000009649450ef75856b33c453da021f9f30456fcc3807f5954354231a3adb50c3233a83e3"]) 06:03:45 executing program 1: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={@loopback, @ipv4={[], [], @multicast1}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9, 0xfff, 0x3ff, 0x100, 0x1ff, 0x90002, r2}) 06:03:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xc1040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r2 = getpgrp(r1) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x4, 0x7fff, r2, 0x0, r3, 0x0, 0xfff, 0x2}) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) fchown(r0, r3, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r7, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x3f}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000180)={r8, 0x4, 0x0, 0xb1db, 0x45d0}, &(0x7f00000001c0)=0x18) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xa7425b3b1bba1a0f, 0x0) ioctl$TIOCMGET(r9, 0x5415, &(0x7f0000000040)) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) mbind(&(0x7f0000acc000/0x1000)=nil, 0x1000, 0x2, 0x0, 0x4a7, 0x2000000000002) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, 0x0, 0x0) r10 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) shmctl$SHM_INFO(r10, 0xe, &(0x7f0000000080)=""/71) [ 200.612139] audit: type=1400 audit(1571637825.121:44): avc: denied { map } for pid=7671 comm="syz-executor.0" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=29097 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 06:03:45 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x800) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r3) [ 200.705888] mmap: syz-executor.4 (7683) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 200.749339] XFS (loop3): unknown mount option [norecoVery]. 06:03:45 executing program 2: rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x8}, &(0x7f0000000180)=0x8) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="1c001c00", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x7c, &(0x7f0000000000)={r3}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={r3, 0x4e, 0x20}, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r0) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r4, 0x8930, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_data=&(0x7f0000000000)="a6c9b76454f1531b439eeb5eeea4efce8d29478b7aaba56088e6ba655e1fee48"}) 06:03:45 executing program 5: prctl$PR_GET_DUMPABLE(0x3) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) uselib(&(0x7f0000000080)='./file0\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0xa001, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f00000001c0)={0x7, 0x21, 0x2}, 0x7) getitimer(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x40000000000102}, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f00000002c0)) sched_setattr(0x0, &(0x7f0000000040)={0x33b, 0x2, 0x0, 0x0, 0x1, 0x7}, 0x0) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x181200, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) [ 200.847299] XFS (loop3): unknown mount option [norecoVery]. 06:03:45 executing program 1: mount(0x0, 0x0, &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e20000890787a208d214c3007d3a75d9a27cfdd1b19ca1eee483ce153ec837570186306ac5c92bc497b476d74a4bfcb811a9e875943ab0078d1f4fd8d5d619ece41d904c5aa7deeedb3737e6fa91832979c7455022c2dc6de56e03c2fcaf370f6d0875fc9228e1e830836d12d50b2483420f8c0e06df5feb31ba2444b85f595f06b52592213b0f1f091182c711af90341e5ae4cdede43b232"], 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x480001) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f00000002c0)=""/75) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') socket$kcm(0x29, 0x4, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000ac0)={0x138, r3, 0x600, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x0, 0x4, {{0x0, 0x1, @in={0x2, 0x4e22, @empty}}, {0x0, 0x2, @in6={0xa, 0x4e24, 0x2, @remote, 0xb2e}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x38}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_BEARER_PROP={0x0, 0x2, [@TIPC_NLA_PROP_WIN={0x0, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x7b9}, @TIPC_NLA_PROP_TOL={0x93, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0xffffff01}, @TIPC_NLA_PROP_WIN, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x7fff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0x7}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xb70, @dev={0xfe, 0x80, [], 0xf}, 0x70}}}}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x57b}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffff22}, @TIPC_NLA_SOCK_ADDR={0xfffffec6, 0x1, 0x4}]}]}, 0x138}}, 0x20c0) 06:03:45 executing program 0: mkdir(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x800) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r3) 06:03:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f00000000c0)=[{&(0x7f00000025c0)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='commit=0']) [ 201.140147] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 201.150221] audit: type=1400 audit(1571637825.651:45): avc: denied { ioctl } for pid=7700 comm="syz-executor.2" path="socket:[29171]" dev="sockfs" ino=29171 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 06:03:45 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) pipe(0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) chdir(&(0x7f00000004c0)='./file0\x00') rename(0x0, &(0x7f0000000080)='./file1\x00') write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 06:03:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0xffffff4f, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x40}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000040)={0x5, 0x101, 0xd185, 0x0, 0x0, [], [], [], 0x7fffffff, 0x5}) [ 201.253877] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 201.314722] bond0: Releasing backup interface bond_slave_1 [ 201.324600] audit: type=1804 audit(1571637825.831:46): pid=7738 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir432605567/syzkaller.JakQBJ/12/bus" dev="sda1" ino=16537 res=1 [ 201.381762] audit: type=1804 audit(1571637825.841:47): pid=7738 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir432605567/syzkaller.JakQBJ/12/bus" dev="sda1" ino=16537 res=1 [ 201.608892] audit: type=1804 audit(1571637826.121:48): pid=7738 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir432605567/syzkaller.JakQBJ/12/file0/bus" dev="sda1" ino=16564 res=1 [ 201.667114] audit: type=1804 audit(1571637826.121:49): pid=7738 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir432605567/syzkaller.JakQBJ/12/file0/bus" dev="sda1" ino=16564 res=1 06:03:46 executing program 4: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x78) syz_open_dev$sndctrl(0x0, 0x0, 0x32202) r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205648, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) syz_open_dev$sndpcmc(0x0, 0x0, 0x2000) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, &(0x7f0000000040)={0x3b23, 0x0, 0x802, 0x0, 0x80, 0x10000, 0xfffffffa, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r2, &(0x7f0000000140)="91f2e8601f8c647f2a5540600c574d1276cfc466209d15fffe5a04d02ca681b8c1181bb8f62d06d109959ad16aab5c971b5a606697ec9a156e2a58ebbabd8c533cb6a51f2ff512666d6b152cf03359773e89e788dc436e95d84cebb05ffc705f1ac039020a6b2229f8cb9f86841a235149bc63883c0e9a4e05", 0x79) socket$rxrpc(0x21, 0x2, 0x440010004000007) mkdir(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) rename(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x20000, 0x0) read$alg(r3, &(0x7f0000000200)=""/123, 0x7b) r4 = syz_open_dev$video4linux(0x0, 0x3, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000000)={0x0, 0x0, 0x0, [], 0x0}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r4, 0x80845663, &(0x7f0000000400)) [ 201.732253] syz-executor.0 (7738) used greatest stack depth: 22736 bytes left 06:03:46 executing program 2: mount$bpf(0x20000000, 0x0, 0x0, 0x3061012, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x100000003, 0x3a) socket$packet(0x11, 0xa, 0x300) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) pipe2(0x0, 0x800) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000000)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x0) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$clear(0x7, r2) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0xc) 06:03:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xe489}, 0x19400, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) getpeername$netlink(r1, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) r2 = dup(r0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r3, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) fallocate(r3, 0x0, 0x0, 0x2) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x68) pwritev(r4, 0x0, 0x0, 0x0) fallocate(r4, 0x20, 0x0, 0xfffffeff000) fallocate(r4, 0x0, 0x0, 0x10000101) fdatasync(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r8 = getpgrp(r7) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x4, 0x7fff, r8, 0x0, r9, 0x0, 0xfff, 0x2}) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000)={0x0, r9, 0xee00}, 0xc) pwritev(r4, &(0x7f0000001500)=[{&(0x7f0000000040)="468eaccf253164d8fa0501fc0ce89c02f04d7ac901620ac20c", 0x19}, {&(0x7f0000000080)="714e73ecdd1134632c7a7f8f41051ac3a51c23169e273e04247dd8463b8878cffa1b9436d41f7119602d0304b1d7877229e6d312f8153cc3a2b4b21ad6a3bad179cb4f21456cf9bc388447ef15a678ea52cf84f85e71ce97dda171b40d319c330299d91e6569acba5b05fadb02dfa13814d7604b36d40e646028fc46b085c9b7", 0x80}, {&(0x7f0000000140)="6057a4c2d0a3bf4582", 0x9}, {&(0x7f0000000180)="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", 0xbc0}, {&(0x7f0000001180)="aec3f8bc78478a76802162dfa13bb13d6aeef761f931aa1bc418962ab6db72d6a3476bfc4d972b9e3bb8cf4f9cf9d298f02ca8994bbad7b941c7771231eabc90c3f6b40191f5a3465df12dfa6c433e285466d66307f7d92b14f7c29ca459", 0x5e}, {&(0x7f0000001200)}, {&(0x7f0000001240)="6d9a86b6bfba758b07e083a4fe2d6ce6261f57c06c1c67352c5b3ef576dc1bc2f1da45ce7bd357926b20faf3e42dbe7ae34e527f0739addd128567ec9dfb4ddbdc67ba6dba1c40ca518cf48670ee929182906a1448bc8eb57f451bbf0332f167c8f9792e5a508808e6dd6a2eda03", 0x6e}, {&(0x7f00000012c0)="6f3f799b972e7fbf33572c0126c8efeadb7ab6c6a1171e5ed4ec99abde769d7c37ad5ac59f10c8cdd53e0240d6e346313a7179098f70ed441819f02088fb60ad17f8fdc8f4f56d5e35067294767238bc5f4f375e4a77694c5ade07b60c1ac00a9d77c3a04eb4255ba08057c6e7dd8a5fcd71e3de42ca32f0037d0c7159877ff6edb0a1bad254977e2929d08bb1900e5f9c05a0365d8438d63c0c06ee4c", 0x9d}, {&(0x7f00000013c0)="383e987baacc58a5", 0x8}, {&(0x7f0000001400)="1f961a564e0718f72d0ae1534d77e6557a2be09ee73195ad47d2c5ae3fe2e80c39878472601f8dbd61805914cc123fdb19bdc5d970de249323c50306c31149fbf0ab65844666917cf0060f74fafabc068c63484f9c28333416ce4a722c510616f11d832171beccec88fccfeb70e54581e04bdf82e83678a844cc40760cfc1618dfdc5f7b48a367aa8bf15ab9d962dde4634d277ed95bea6ae6ccda576e745b67e36c44881ab1d53c91ef67fbd7afa753b959caa678494b9eb352728a8ab20a9518db2c391daf1234ecde696b802a955d5fb6579c9127ae2825491c229ae2622b", 0xe0}], 0xa, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, 0x0) sendmmsg(r2, &(0x7f0000003d40), 0x400000000000045, 0x4040800) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r10, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r11, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004ec0)=[{{&(0x7f0000000dc0)=@ipx, 0x80, &(0x7f00000010c0), 0x5, &(0x7f00000015c0)=""/86, 0x56}, 0x5}, {{&(0x7f0000001640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000001140)=[{&(0x7f00000016c0)=""/96, 0x60}, {&(0x7f0000001740)=""/216, 0xd8}], 0x2, 0x0, 0x3a0}, 0x1000}, {{&(0x7f0000001840)=@can, 0x80, &(0x7f0000001c80)=[{&(0x7f00000018c0)=""/196, 0x2b5}, {&(0x7f00000019c0)=""/231, 0xe7}, {&(0x7f0000001200)=""/18, 0x12}, {&(0x7f0000001ac0)=""/134, 0x86}, {&(0x7f0000001b80)=""/66, 0x42}, {&(0x7f0000001c00)=""/84, 0x54}], 0x6, &(0x7f0000001d00)=""/169, 0xa9}, 0x4}, {{&(0x7f0000001dc0)=@nfc_llcp, 0x80, &(0x7f0000003080)=[{&(0x7f0000001e40)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/57, 0x39}, {&(0x7f0000002e80)=""/67, 0x43}, {&(0x7f0000002f00)=""/126, 0x7e}, {&(0x7f0000002f80)=""/4, 0x4}, {&(0x7f0000002fc0)=""/54, 0x36}, {&(0x7f0000003000)=""/44, 0x2c}], 0x7, &(0x7f0000003100)=""/174, 0xae}, 0x9}, {{&(0x7f00000031c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000003580)=[{&(0x7f0000003240)=""/59, 0x3b}, {&(0x7f0000003280)=""/94, 0x5e}, {&(0x7f0000003300)=""/228, 0xe4}, {&(0x7f0000003400)=""/133, 0x85}, {&(0x7f00000034c0)=""/187, 0xbb}], 0x5}, 0xc1ec}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003600)=""/115, 0x73}, {&(0x7f0000003680)=""/24, 0x18}, {&(0x7f00000036c0)=""/106, 0x6a}, {&(0x7f0000003740)=""/122, 0x7a}], 0x4, &(0x7f0000003800)=""/174, 0xae}, 0x5}, {{0x0, 0x0, &(0x7f00000039c0)=[{&(0x7f00000038c0)=""/233, 0xe9}], 0x1, &(0x7f0000003a00)=""/249, 0xf9}, 0x42}, {{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f0000004b00)}, {&(0x7f0000004b40)=""/95, 0x5f}, {&(0x7f0000004bc0)=""/94, 0x5e}, {&(0x7f0000004c40)=""/81, 0x51}, {&(0x7f0000004cc0)=""/178, 0xb2}], 0x6, &(0x7f0000004e00)=""/184, 0xb8}, 0x6}], 0x8, 0x8040, &(0x7f00000050c0)) 06:03:46 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r3, 0x12) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000002000)='/', 0x1) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 201.918603] ptrace attach of "/root/syz-executor.0"[7425] was attempted by "/root/syz-executor.0"[7760] [ 202.000509] IPVS: ftp: loaded support on port[0] = 21 06:03:46 executing program 0: open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000640)=ANY=[]}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000640)={0x34, 0x0, &(0x7f0000000480)}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2000, 0x0) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000500)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_RUN(r3, 0xae80, 0x0) 06:03:46 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000003c0)=""/185) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000380)=0x96, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x2c, r4, 0x1, 0x0, 0x0, {0x8}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x60, r4, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x4000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 202.191306] audit: type=1800 audit(1571637826.701:50): pid=7762 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16557 res=0 [ 202.375278] protocol 88fb is buggy, dev hsr_slave_0 [ 202.380748] protocol 88fb is buggy, dev hsr_slave_1 [ 202.624840] protocol 88fb is buggy, dev hsr_slave_0 [ 202.629952] protocol 88fb is buggy, dev hsr_slave_1 [ 202.694858] protocol 88fb is buggy, dev hsr_slave_0 [ 202.699998] protocol 88fb is buggy, dev hsr_slave_1 [ 202.774896] protocol 88fb is buggy, dev hsr_slave_0 [ 202.780035] protocol 88fb is buggy, dev hsr_slave_1 06:03:47 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0xc125, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) statx(r0, &(0x7f0000000180)='./file0\x00', 0x4000, 0x1, &(0x7f0000000580)) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x6}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000440)={0x15, 0x110, 0xfa00, {r4, 0x7, 0x0, 0x0, 0x0, @ib={0x1b, 0x7, 0x0, {"512f20f15fe9110e8170da3e868a8600"}, 0x6, 0x1f, 0x4}, @in6={0xa, 0x4e22, 0x5, @mcast1, 0x8}}}, 0x118) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) preadv(r5, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/171, 0xab}, {&(0x7f0000000200)=""/181, 0xb5}, {&(0x7f00000002c0)=""/191, 0xbf}, {&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000180)}, {&(0x7f0000000380)=""/58, 0x3a}], 0x6, 0x0) 06:03:47 executing program 3: r0 = request_key(&(0x7f0000000080)='ci\x01\x00\x00\x00\x00\x00\x00\b\x00\x00', 0x0, &(0x7f0000000100)='/dev/net/tun\x00', 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) keyctl$unlink(0x9, r0, r1) syz_open_pts(0xffffffffffffffff, 0x202081) openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000003c0)={0x1, 0x19c, [@broadcast]}) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = open(0x0, 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) r3 = gettid() ptrace$cont(0x3, r3, 0x10000, 0x1) r4 = gettid() r5 = syz_open_procfs(r4, &(0x7f0000000040)='loginuid\x00') ptrace$cont(0x3, r4, 0x10000, 0x1) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f0000000040)='loginuid\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r2, 0x0, 0xc, &(0x7f0000000000)='cifs.spnego\x00', r8}, 0x30) wait4(0x0, 0x0, 0x2, 0x0) getpid() listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x4, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) socket$kcm(0x2, 0x20000000002, 0x73) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x1000, 0x40000}, 0x0, 0xb, r7, 0x0) perf_event_open(0x0, r6, 0x0, 0xffffffffffffffff, 0x1) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$kcm(0x10, 0x0, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r10, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r12) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYRES64=r5, @ANYBLOB="04dcfefe29b7c7", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESDEC=r12], @ANYRES16=r7, @ANYRESOCT, @ANYRES16, @ANYBLOB="179b2b65b462f67fb4eba1b2d47e8e1321d9", @ANYRESOCT=r11, @ANYRESHEX], @ANYRES64], 0x1f) 06:03:47 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000340)="77d9c084f0248abacd008dc578606bc9de0d3c232719077a399c4d84958bf1d016a8f0d3237fa50a38ee3814aaf2de9260c00992af4ae9b3864121a61f13731f463a07af5ad6fc8412bb0d9dde1800d4", 0x50, 0x5a}], 0x0, &(0x7f0000000500)={[], [{@subj_role={'subj_role', 0x3d, 'ext4\x00'}}]}) pipe(&(0x7f00000004c0)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10001, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x4801, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x9) 06:03:47 executing program 5: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e1c, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, @tcp={{0x0, 0x4e20, 0x42424242, 0x41424344, 0x0, 0x0, 0x5, 0xa}}}}}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$TCXONC(r1, 0x540a, 0x8) 06:03:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000029c0)=ANY=[@ANYPTR=&(0x7f0000002940)=ANY=[@ANYRESOCT], @ANYBLOB="ace55461634c37c56481376d3e70ec41be9098fbfec893715dedba83215c640537182785657705460a0ae8523f4f998fa36d21b03540c1e6ce2f8f1dbf310ba2b62ca2a627386a686ce611f7934da2cee16c4136b6ce2ce3903b0a0c35550af0e6d83541c7e5871284ea162170ad33ebd3caba9a77c5fc8e5a4d2156bece793b700b1329ddd81f334829f4609744755ce9ac8e135140322b56ed7f5c738c9589e5d662206b94aa1411a864d6961149721db3c8e553da5855fb8a", @ANYRESDEC=r2, @ANYBLOB]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$rxrpc(r4, &(0x7f0000002940), 0x0, 0x40000080, &(0x7f0000002980)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x100, @mcast1, 0x80}}, 0x24) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x4, 0x7fff, 0x0, 0x0, r5, 0x0, 0xfff, 0x2}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r7 = getpgrp(r6) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x4, 0x1007fff, r7, 0x0, r8, 0x0, 0xfff, 0x2}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r10 = getpgrp(r9) lstat(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x4, 0x7fff, r10, 0x0, r11, 0x0, 0xfff, 0x2}) syz_mount_image$jfs(&(0x7f0000001540)='jfs\x00', &(0x7f0000001580)='./file0//ile0\x00', 0x8, 0x3, &(0x7f00000026c0)=[{&(0x7f00000015c0)="a413af9ca4c552585f0d8c863152a686ede118909795397623596c64befc996aadb815150f9cd4a7f77ec4b3b7063ed24b1e0a6e128b41986dbe97d1f1b3853ff6e64f49796ad394c0e408167da8abc594e57a0ba5aabb331ba92e01d84e36b966609686d1e677ab043f9b8a4250ebc76f9496c8bd0351807ac003dadf38fb24b9e36d188fc5a1ff9d5a6abeefe124089765b09b987a554e80f218e1af5fc3bc3e59dd1d5de6ffd9f7bc830c38bd14c86961cc2e8c1fda0436a169992a07ed1d364c41df69848c27a0f8c18f143557ed00b81d562f2868bf45521ef2a040ba2dcb52f51a0ea7a04a277d1a06b7d19de2e0c315e931fe4908c1b81e1f76f4041c6bcc716ec91c81f359cc082bd13be55e707a92cb763d9552860bd0b20a807aef612951ba1ce55ff8a9cf73ce8b66f8e0044a34c5998d3572d074061de5c277abf15d5befafa68d23466e3d32fb6d6f1d44c9c8892ebe16937b6c3f56e65a03d84157ced5c6e4d9a372dd8f2e550460808b4c26bdbd67dd0b0f88a421da5dc4f0bf9e1334871f1f0a819245a5421741a24f5b7d3edcb7d7ea6c386c4ac8c54045fdda1c83bcc53a33d95e1c5dbb6ac518488e3dd9b9b8eaa6773e282a7152c76e29566a855e0cd4ae27e7d492a1a90fcc6b8d11b6c257b26aa8c63e2ae6d0da289f41a7684735aeb4889854b19f25a3d6ae34523e35868c449ab3d7d170358edc7fb39465c20f5a6e7f35acd28110e1441a70aa1cce2918be615f58c8b14e998b5f4fbda87c1891a9440763781440df2a15ce628f585406ad09fa47abac589533a94c20183498cec2bcca3c2953921e1137973c396330d6616904795765250e1431f4656c4e801776a108f371a88ce0f0ba59e7656a005bfcfcdf414d2aee6e0e38a0613559910ed58ad33b5c28182f0f0fc90d25c0c8b78cc819633759c85638899ea4f7a9af4b97ce754eeaf2748bd52b77e6c22d78f855dc0860f5abf1242c78de150fbf3163eee512c96a7b5c1a3702c01f2788af8d4f6f2bc2b3cb9dcec8afd9a6a07b63574fc513852d0c0bd8728e4fdd40e39c832ea6a179031163e1e2308b51b025356084001dbf108e84fef73e4be120849d13910fe9ced7da6f2e17905c5014a15a51b8b723ef6cfe083c9a437ca5ecd0e5d7d6fb63fa03b9ce6dab7c0ae97036f99e2d2b2301fe7c4a3b76f6be3552177ea1907bdaeab31d57ae89dda9050655e4232f2d722f4b924a837f8ec3bfdba9e4d29d8172bafdf2227b411a0c14044bcaf805cc70aecdb423ce73596c66fac28e04df4a90f1211fa0c3216d6ab8bccc4eebfdfa064c5ea4c8e69b015127d2b5c043c7040ecb3544f54dcc2cf94cada7061b6b336c36b5f90c71af789e9bd2769d3c72778a34a3c7404dd9d616f5a647a7b90fe1b4d105cb0d3f1d242c178257534ec388325d4ef24c50d64daad29a051ed05d8dc2fe346ed67b2a716e650b6810dbd7c32947316356f3274ea9d03f2c584c3b79e37b7081e93b99a5a212136b53c5fa7ff54dd63dd931dbdcebe5ed217f99606e501599285da51cdfce491ff7c33d38e103f472330a26ba298a24f86171ec21c527ad6cc4ff9cc9fa88c6d4306ea3848f863be0992cd5e3ce4c6c3cf43a8d17a4e5eace3dd24c90107c9b6d5851770100131b5b26495678bf79849a939151c0aa87b944b33db1fbb8aaa31ceca3b05502745db184b3dd178f67bd7653cc36e4cff78074c124e60726145fb7ad0203184a75b961a4681aa94fdad3f4648473c646b3e75cbcf74f5ca3e33cb56fff34822845eb2acd2145c8bcc824c132a3eb1d38d71c4fc27e217c4d336dff12fd74ac65edb8a9269203f408867d243ccbfec1ea8c93c28d7d8ef6e86dd159eebaa7bb663b97460d4fb2ea724b428e76c2a28a0d052259e1164cbf2bb92bc98aa5ae4001e85326fc0a3fd5a8307f6f5457473d56a01383f7320265060aaaa8967503fb0a94fe87dbf2172c254b9c672e81265aa87ff339e9d6c6185f74383c22cc11897a9ee8a39dab7dc99bfaedd266f77fa225011298a562c04d36f5cb9b183521cc9a943ad79c62c78fa5beb0f90110d3ddc832bfeffb08326cdb4f43675a2569b85689f473963d6600133b18aa81a608cf88f8436e8473db7316b6d496836864bd5737d406fc8018bdc75c9f08045bfc2f8874a390f3b3bd471ae49bd981756aef2b030c60450f4a4d7599e014062e68a7199ca3b1b597417b92a359f4c1793e764b1e305b02db57640cdd141801a8c98970374063544d6cd6178ace9ae1c5862abc6a5315a632ec996afe5331e75a033b03ff1cc1fd7834b1440d3be77f2f2e0a669dd276d9ea5a510ed74ad701e2b07cdf86058071178bbcce385e08baf47ba64ff55630121ab2a20445615abcbb2c80d98f38110042c85c98e419e495a42f60a51a7446a3cc1de9d85aed2d0d0557e7f44800fed6382bc2186b92e067a49563630313591cd0eb00b8478b38a1e83c0e9d40583245e3ce777dafa870fcf9a808e3a35369b7dbeb9aed9a506828d5290e44107c8843ae7bd1676a788cacb4b0ffa4e5252843d0ca4cafd75aeea6b85a39e6ac77ce852c177161d5518d170946b31dd3fd4819d04191556698bd7935408429327aec535237fa4849938317352af1ce5b620e859916299f3c4c003dcde2be02d9ba1593c7ae39ccd7fe662f5b076829bba94354006c3d38c23278b37ef11897fa6060f367e142bfdf303991a99e17b877cd13cf2301fe0711c7d5cb5d7f89ab724f37465edadd5c2f0eec006afb2e682db6351b4018708d17536d3bdde28501b99d6b78a53123f4830384a21000617cf2cfdcf0ee65510db5d2c1618eff3de2573cfd2fe3e94b75f084ae04b372b7ad85e4f5dec2ad69726a820f677b9ccd0af53bf9cc7729228fb936699e4aa1c4a27ee718ea0b3e20901764799c7f92793263d52130753ca69cf23eb5131070b1c3da1f0e0bec2c2bac7a80d3331fd9ceac604182bbf44457482afd1c26ddf297bcfe38776c6b0ffe56e75298de1465b36672ec55c242e0300d3a15ce76a8bc0ec20e3a0025de1524d3acec049497032004cc6c5edb967bffe191b6f3f2f1f43c37c756633b4acced20d3f731e15b320e4ff9da21603cfa1989d5aba99a52883cf3fe88f56a33f744dcb061f64603a6ff2d85eeb4ad50f15c7ec8ffd39d6ae74823d32f7756d2f73ffa3e5a0467528ddfe8827340f37caa348a6bbd8cb5dd354f3238874f18e286ed90d64b406a31334c47e596e438a61e464d8b4f18b397db42e77e3bdfc5e961017d7de6436ef531960ca37dbe5016cd568c23f8cc1e31e2f67c45bdf1f21b76f4ed282be09d501f0df11c0d64f2d964aadb55ea7cccdc27bc7200caf95ea78f32f2989325f24feb37a838867c26e83d7769ce74fe4c8f1309988c9a2f258d8f8f076728bc86d0e1a2ba3addbf2c3c4f77f92439040edb4b21f30215862f1d27d1657a4e2f2932761e6fb2b4a9b673441437b3570f670c4d006ab1075fba76659955d5d6e9767c118a15ae141cbd196cc31cda1690524e6ccfbad6c843b41a8e291fb041b3518e837f43843323df3714b61f2b77ecad056a4557b5954264f47ab145514189ea3466e0c18270ceaef2bfe21d9fc34bab65609b79fd1bb2245017ab5da1f98bf5961dddfb85eab485f60c5584810188546f57ae89db7f6dacb568db0b5ee4595b1d6ec54db942edd4db67ebe571d62f931008cc92d612eb27a043d6145d6552f769a931b1aef9977187ca1feb2902316f94138db5905070886409cd8fce48107dde08456d6dadcaa561332b82461d3ccdf681a57dda49e8ac5968fbf179f86d23e7a9f7823484d07a74746ffb6296740c1bca321ca8292015c6729bfc894c3523ccbfb3725606c9a19ba672d36ba34c91328ad3994faf39fad33d407009dfaa27566e709c2635a4d9301a6fbad5a433a546cbba479ae86f6dab25358a175c5948df14b93e31d7f67e5e0e0487f1fbdbdb72705adf4a78db01a6379b927e950a4f51658e2168b1c80316ad95745d7496f5dddf41b12afc41867c360794df8569dbe24f4030fc1c72ea57e9f247c9eb9a37906ca1fed4095acf5ac9f8c231b24061c65c4fb229ba4a9146e69062637518e9d3ab91b0ed8dbe80d288489cd16d7127a12a2031334ea18755ba95f1879b664260d5858b2a5f9fe61c562053ad26bb8cec0473c18a3f3bc211034351dcf6c5494ba41cf74d2de3780aa667088e8889c4f852726ba2255009523ddc6a708798c537d6573f0c852b56302baedafc272a1d73d5450e760fdb764a4a3765a90dee8673776272b1ad65c101027fe90905cd661b643b6dfb439ee2b2bf5ce9e126c46595e07e6a4690916de4f863d95dda7158ecfc8609f36635f46e6a5376a90ee858bb211f64e9ab66e3913fcc46b610c525795c22c5e44ddc789b3256330ccc336e4527a6f5c63e816765082f448852d5cf9d712e236ea3b84d8f3de797857c5da6c162d64ccddcdf9aa9f243325bee6aaf07b1a6179aa112b58d280dc99e5ac1e07e4fb3fbb0a1fb56ef31c6f4d5e1f784b026223fcd17337b4e073c9229ddb9cb94b99749d37667dc05e718a1b62eed2ef37d56cbf1e49e6b432991900bc0f71dd8850802bb13adb41220ccabb2810577ce7c43c5edd72b8d8a5cadf4f738f5209f185320575ebc35de463cb15d1730d52f6af996f78227d93671fde2807e12e9304e80e3961c5864554ebbe535174991244852d47010322d1456cccf7daa6ca4e2c095d5b82c610832aeda5c5553363ec62bbe469a8d8497fd01faa2eae9b50bf134a3bcad54bb879ed0bd6d9065141383fe66d7cdbcbde0756990213f632e4840f850789c4aa45e842ad0662d8fccaf0b4f833efe96dff5473e67a0a6f2e4488e4862d114db288fec95bdec4f0836a330bf80af18228b5240e2788fdf701887f05124f74828e78e4546ca6d44693e8028e46cc0041e08adc2964a7c16cf18c1d9842d4359b06571f38bc663fd7ce79847f8b63b515d9a036fa811534619c3664c53086e248dbe47e4aaaf5b1bb2c5e12513dade5f9321cd39229718a722617c7a4c6247c4dbfb32809d7a8c6a09430a3ba3b92208e725aba231b82c6dcedc81677c885f5a9c676358c231c8f7a7c7df7a28cf0be493a3ac536a13846a43d9a9b5289e70f3004f86997dea03a7b84fd06f2ca19e004c366e46fbb99e9354caa9f30169ac685f29a1d8d942eefbb1bc1b44c60144dfd23e12c9d8a1797415e787d12ab46dea657a713414851db16c175ea4b00d461ff054c3c242c8c9b882777bcbd6b446ed9989f05b702600e2b53fb6f91f75939a007576cc2cdd50eaa11000e2fe303a9de3b8b19f05c9a56b817e1f72809bc8e56c66f29a015565bebf5d66e8faf467dd4db38a34359ce7353d9d738c6f93d68657080c4f203cd938d47e5a9bbc5dae54c66f27b551c34d46955054f9d018542b63463f5b122e854c62261b9044a67536b69b38cb6fdc6aad7245abfdab417637852af1bf06b72801ecc867f8cd48276aa0c982f28f1b709b9a190914afbf96f21bda85f796606b82baa1801ff00f38bb58b18cbc02e1efb6dde5eef246d6dabc9a8c3df8a5a8c09867559fdbda9bb97141db71c0a335f7cdab53aeb38f714ffb6efc78722eb66f0666780992486dbb9bda77f3947faf582ecc95fa7a31ae8203ab79ff59ec91666410fd7fae4a9712dd3e5ffaa19c920be0b6511b50663c2fd17dd800f006a66f974fc90c67d452afa40dfb528857ed", 0x1000, 0x2}, {&(0x7f00000025c0)="a90c89689ff46cadc57c574dc58dc5b066dbfe6de64e53198e80427755a63e077d61cc5c7432beffcdda1c5e572ad92614720490d53aca22762b0133fb6d134780f8d2d1b90be0ddc3238371d892ff06196503f6cd0f9b6e61d2dbc6ceed7ad3aba8bb8c6e02a48aa7", 0x69, 0x4}, {&(0x7f0000002640)="f68371ee4d5a227122ca75c5c4dc23d913181fe00453bd742f4ebd925e4d6b7aa6307723fde500296da0676047d0c7abe6804d14ed2edbd4289f3aa75509d75200644f4af595f55d325e285637e83533e76d07d149beef4d1d43adf87689fce4de17e12c4d52d89cda8d17212b4245b08e77e41c5128d2", 0x77, 0x3}], 0x400, &(0x7f0000002740)={[{@discard_size={'discard', 0x3d, 0xffffffffffff0000}}, {@usrquota='usrquota'}, {@umask={'umask'}}, {@nointegrity='nointegrity'}, {@gid={'gid', 0x3d, r2}}, {@uid={'uid', 0x3d, r5}}], [{@fowner_eq={'fowner', 0x3d, r8}}, {@fowner_eq={'fowner', 0x3d, r11}}, {@subj_role={'subj_role', 0x3d, ']eth0^+]}.GPL'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x39, 0x65, 0x65, 0x45, 0x33, 0x30, 0x38], 0x2d, [0x6, 0x0, 0x64, 0x8be35b43fd736534], 0x2d, [0x66, 0x61, 0x30, 0x30], 0x2d, [0x31, 0x4b, 0x30, 0x32], 0x2d, [0x36, 0x36, 0x65, 0x62, 0x65, 0x31, 0x64, 0x34]}}}, {@hash='hash'}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@ax25={{0x3, @default}, [@bcast, @bcast, @rose, @rose, @null, @remote, @null, @bcast]}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000080)=""/1, 0x1}, {&(0x7f0000000280)=""/162, 0xa2}], 0x4}, 0x1) setgid(r1) mount(0x0, 0x0, &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) truncate(0x0, 0x9) rmdir(0x0) r12 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x200, 0x0) ioctl$UFFDIO_ZEROPAGE(r12, 0xc020aa04, &(0x7f0000001500)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) llistxattr(&(0x7f0000002880)='./file0//ile0\x00', &(0x7f00000028c0)=""/84, 0x54) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000003fc0)=ANY=[@ANYRESHEX, @ANYPTR]) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000001480)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB="00008b4fe4ed08b82f80b5d323b03328087e07de4e57c474e2ed2dde8126456956bca5d1b141ef4bf106864bc9520192ad85631c8168ff491b78e5a44f8b5ab6697ebc3f9cd2d14fd9dd5c247673f4b4619a00"/96]) [ 203.194450] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:03:47 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x4, 0x4) r1 = socket$inet6(0xa, 0x1, 0x8010800000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x1ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100}, 0x98) sendmmsg$inet6(r1, &(0x7f0000002980)=[{{&(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c, &(0x7f0000000480)}}], 0x1, 0x850) [ 203.361743] JFS: discard option not supported on device [ 203.516770] JFS: discard option not supported on device [ 203.559844] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 06:03:50 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r7}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=@newlink={0x30, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000000)={r7, 0x7, 0x80, 0x4, 0x1, 0xfd, 0x85}) r8 = socket(0x1, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x1ffffffff) ioctl$NBD_DO_IT(r2, 0xab03) 06:03:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="0900000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24fd620b2022d5ad63b369aaffe9a6b608a5fece0eca95d71f2d3e60613a027fb50cbcbd92d44076d3b97247e066165ccf", 0x7a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ptrace$cont(0x18, r0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) getsockopt$rose(r2, 0x104, 0x6, &(0x7f0000000040), &(0x7f0000000080)=0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 06:03:50 executing program 0: setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000040), 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x60, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000002200290800000000fedbdf2504000000b047592a8caf92c2acb1ced337805929a77bec7fc10317cecc21ddfe18021b37b929e86f1dae00ec94d87c61fb0a640b3f514d4127cfbd2321e1dfafcee3d2aceedd36bdf1cbc23361a92ffa15cc8316b039fa3fe35847f251094e80a274ca5d3c7a5f9665184abfa8dda6b24d53ee54890e1d7b6b6a2dddee7c9c551653134b5e6fc7a1b70982f6468dd8f71368e5fc652db36a86fa19173e9b65982e13ea5844068efbc86f19cbc0d2af07509a2755e84d63173af28f5799f751"], 0x14}, 0x1, 0xfdffffff00000000}, 0x0) 06:03:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="38f34108c6cf621e09a1af2c7fdb"], 0x0, 0xe}, 0x20) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x88000) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0xff], 0x100000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 06:03:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040), 0xc, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e23, 0x4, @rand_addr="eb3d85035c269180eb39590bf433b1d3"}, {0xa, 0x4e21, 0xa24, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x1}, 0x8, [0x9, 0xffffffff, 0x7f, 0x7fffffff, 0xffffffe0, 0x10001, 0x2, 0x2]}, 0x5c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040), 0x0}, 0x18) 06:03:50 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x802, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ptrace$setregs(0xd, 0x0, 0x5, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) getsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 205.537467] kauditd_printk_skb: 1 callbacks suppressed [ 205.537481] audit: type=1400 audit(1571637830.051:52): avc: denied { map_create } for pid=7840 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 06:03:50 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r1, r0, r1}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00\n\x00'}}) keyctl$read(0xb, r0, &(0x7f0000000100)=""/186, 0xba) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000002000000000000fff6f2a2679748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) [ 205.594942] audit: type=1400 audit(1571637830.081:53): avc: denied { map_read map_write } for pid=7840 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 205.696485] BTRFS: device fsid fff6f2a2-6797-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop2 06:03:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfefff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000000)={{0x0, 0x80000000}, 0xebbc9b3502b4df3e}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) sendto$inet6(r1, &(0x7f0000000140)=',', 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r7, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r11, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000340)={0x0, 0x8f21423d5c2e9a1b, 0x4, 0x10, {r9, r10/1000+30000}, {0x3, 0x1, 0x18, 0x6, 0x7, 0x4, "29892c58"}, 0x7, 0x3, @fd=r11, 0x4}) r13 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x800, 0x0) fcntl$dupfd(r12, 0x406, r13) vmsplice(r8, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$BLKGETSIZE64(r8, 0x80081272, &(0x7f0000000100)) r14 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x4, 0x8700) ioctl$KVM_GET_DIRTY_LOG(r14, 0x4010ae42, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x7c, &(0x7f0000000000)={r15}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000080)={r15, 0x4}, 0x8) [ 205.741792] BTRFS error (device loop2): superblock checksum mismatch [ 205.762752] BTRFS error (device loop2): open_ctree failed [ 205.861226] BTRFS error (device loop2): superblock checksum mismatch [ 205.907823] block nbd4: Receive control failed (result -107) [ 205.916024] block nbd4: Receive control failed (result -22) [ 205.924997] BTRFS error (device loop2): open_ctree failed [ 205.932879] block nbd4: shutting down sockets 06:03:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x100) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2241, &(0x7f00000012c0)={0xa, 0x4e24, 0x0, @loopback, 0x2}, 0x1c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="650f0fa8a4000dbaa000b86340ef6465660febb600580f7885f2009a1d86d900660fc7b77b0026360fc76800baf80c66b8d4dcf98366efbafc0c66ed0f78cc0f09", 0x41}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x4, 0x40000) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) 06:03:50 executing program 1: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x7fff, 0x7fffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200000, 0x0) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x84002, 0x0) dup(r1) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) readv(r0, &(0x7f0000395000)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1) 06:03:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) pipe(&(0x7f0000000040)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x80, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) write$P9_RCREATE(r4, &(0x7f0000000740)={0x18, 0x73, 0x2, {{0x0, 0x4, 0x5}, 0xffffffff}}, 0x18) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000480)="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", 0x22b, 0x10000}], 0x0, 0x0) r6 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000400)={'syz'}, &(0x7f00000001c0)="04", 0x1, r6) r8 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000040)={r8, r7, r8}, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={'sha384-generic\x00\n\x00'}}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="aaaf4b3aef5b66df0408e54f075e7b745ef415c207e50b4c6141db07fe5281c27af791b110c9c4379db04734928d1e37c12a93a04031f61b94388cfc833a4f3c26b6c8e13706c18dbe0573d6c9825add9813c5374672a8daf734382c5279030334dabfdf687beeda0b4390fe7b5e6607d3263eac1a949596ce3a10a4617224d7a6f20af9d1", 0x85}, {&(0x7f0000000300)="ed24c4cb50938e393195b660ae139d91e4b352ba2532911cd52b851482814f41001b684cf73395678d31ebebff6cbfd3282422b6d7c07d59bf143318c9d3ea6b90484bbd7225e908a6af1162e056e688a0352d7c491bb68eebc24134f34fd98885259f886d21e82aea325bd0da150d2b1c656af2aa586e83730b5c3a6476d4b2fc6be8634b0e5cd980f8b88fb1acd938609eaf9a6458b75444e988333b38949684d723", 0xa3}, {&(0x7f00000003c0)="1866de4a181d468c231301436202aef1e23f508e93feacf75e1e4bb43aa5e5045ea48cb352e7cd9c5c3487f47e7c8b0de13fab766307716a68af55453fdf3f644f486015316a57771840b34226af2d66f614c113284e33b42961216e22094ef803db0fa18617d3b625b229a5d4171525ddedfe", 0x73}], 0x3, r7) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c6530202062747266730020206284bbbdcb000a"], 0x1b) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000007c0)={0x34, 0x0, &(0x7f0000000780)}) 06:03:50 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x7, 0x3, 0x6, 0x6, 0x0, 0x20, 0x1000, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x4, 0x7fff}, 0x0, 0x20, 0x6, 0x3, 0x3, 0x3, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x8) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000640)={0xc8, {{0x2, 0x4e21, @empty}}, 0x0, 0x3, [{{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e20, @multicast1}}]}, 0x210) writev(0xffffffffffffffff, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe0064e200000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed", 0x40}], 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000440)=""/84, 0x54, 0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x31, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1}, 0x8000000200000402, 0x800007f, 0x0, 0x0, 0x0, 0xed3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) renameat2(r3, &(0x7f0000000040)='./bus\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x1}) 06:03:50 executing program 1: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'tunl0\x00', 0x200}) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x30, &(0x7f00000000c0)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000440000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) [ 206.143464] BTRFS: device label ǻ襱oc5ʦ/<'D~P}PGަeSg,b+mY;;SяPL++fԲ\B(|u< devid 13170324015553003679 transid 17050524159161015583 /dev/loop2 [ 206.181410] BTRFS error (device loop2): unsupported checksum algorithm 7790 [ 206.268891] BTRFS error (device loop2): superblock checksum mismatch [ 206.289058] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 206.298288] BTRFS error (device loop2): open_ctree failed [ 206.313834] EXT4-fs (loop1): mounting ext3 file system using the ext4 subsystem [ 206.331892] EXT4-fs (loop1): Number of reserved GDT blocks insanely large: 25441 [ 206.446155] BTRFS error (device loop2): unsupported checksum algorithm 7790 [ 206.459174] BTRFS error (device loop2): superblock checksum mismatch [ 206.535423] BTRFS error (device loop2): open_ctree failed 06:03:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0xa926, 0x15, 0x0, 0xffffffffffffffff}) r4 = dup(r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) connect$inet6(r6, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r7, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) setsockopt$X25_QBITINCL(r7, 0x106, 0x1, &(0x7f0000000280)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000009021edae736ae37834ba6177f4cbdfa07264d334163013a0a102820d3e3b7f41bb93710fea363dca4085cd7ba18417e0e353e5aca58a8c6d374fe023be5629b565c893a38524a6defb1a2f25f29c261f13ac819df5f37fa81a70e3e164edc5002a20175b91c19d4ec83a607f5c021a0bb76fd773884013600171d3ce60578d71dcb20cf0f149946097586b83c177a7eebf66009f412da4bd28984e2c434035db22e09d3f82a6f6", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x7c, &(0x7f0000000000)={r8}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r8, @in={{0x2, 0x4e24, @loopback}}, 0x7, 0x7f}, 0x90) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x30051, r4, 0x0) 06:03:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}, 0xfffffffffffffe14) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(0xffffffffffffffff, 0x3b72, 0x0) sendto(0xffffffffffffffff, &(0x7f0000cfefee), 0x0, 0x0, 0x0, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000300)=0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) flistxattr(r2, &(0x7f0000000180)=""/124, 0x7c) eventfd2(0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000000)={0x8000000, 0x0, 0x4}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r5, 0x11, 0x2, &(0x7f0000000040)=""/74, &(0x7f0000000140)=0x4a) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xed9e77889c53b7bf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f00000006c0)={0x0, 0x3, 0x8}) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 06:03:53 executing program 1: socket(0x0, 0xa, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x8001}) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x141102) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fstatfs(r5, &(0x7f0000000480)=""/4096) vmsplice(r6, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) process_vm_readv(r4, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) syz_open_procfs$namespace(r4, &(0x7f0000000080)='ns/uts\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000100)) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000040), 0x10) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = fcntl$dupfd(r12, 0xc0a, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r13, 0x29, 0x22, &(0x7f0000001480)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) 06:03:53 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) listen(r0, 0x6) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0xffb0, 0x0, 0x0, 0xffa8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xfff) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0xa400) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000080)={0xff, 0x40, 0x8, 0x0, 0x2, 0xb0, 0xa0, 0x1, 0x8d, 0xf9, 0x0, 0x8, 0x0, 0x80, 0x8, 0x20, 0x94, 0xff, 0x5}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r5, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) signalfd4(r5, &(0x7f0000000100)={0x8000}, 0x8, 0x180800) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 06:03:53 executing program 3: msgget(0x0, 0x400) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) mount(&(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000400)={[{@noquota='noquota'}, {@oldalloc='oldalloc'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x402}}, {@orlov='oc\xecov'}, {@user_xattr='user_xattr'}, {@i_version='i_version'}, {@mblk_io_submit='mblk_io_submit'}, {@bh='bh'}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0x8, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x2c, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8001}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4084}, 0x4000001) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000040)={0x0, @bt={0x3ff, 0x10000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x63, 0x6, 0xfffffffd, 0x8907, 0xfffffffa, 0xfffffff7, 0x714, 0x10, 0x2e}}) 06:03:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timerfd_gettime(r1, &(0x7f0000000040)) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0xd, &(0x7f00000001c0)=0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x404200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000440)=""/163, 0xa3) read$char_usb(r6, &(0x7f0000000340)=""/239, 0xef) write$char_usb(r4, &(0x7f0000000240)="582866005ccf672437e2386784a539cf48973d883f51685082c915f458d7b3cb1c171866fbf859dc77c209ddb06b93bdbaefe662390e829908e3da51095bc3e4a8175aeb7477971a76a3db0bc0dccadfef4db4713e9a51af425fcdb7154cb3e983f20d194a7aefc8686f9e7677b8d36d8ab146830b131bbce75ed492a69d27639844dd12ed7ff3500512a378098079c6b482afa9c71cef063f963abe246218ebff1951a5b8f9d00379db74159cd6c820edc6112ce67fcdbd432760ab6efce51ba0fbcd1c5c5c23c3951d02ac7b3027743ca0744afd840886642c63f42045ec6454e1c8", 0xe3) connect$can_bcm(r2, &(0x7f0000000140), 0x10) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x38}]) [ 208.559952] audit: type=1800 audit(1571637833.071:54): pid=7915 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16600 res=0 [ 208.630336] audit: type=1400 audit(1571637833.071:55): avc: denied { name_bind } for pid=7912 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 208.634586] dccp_xmit_packet: Payload too large (65456) for featneg. [ 208.684469] EXT4-fs (sda1): Ignoring removed oldalloc option [ 208.702426] EXT4-fs (sda1): Unrecognized mount option "ocov" or missing value [ 208.729112] ptrace attach of "/root/syz-executor.1"[7428] was attempted by "/root/syz-executor.1"[7917] [ 208.747095] audit: type=1400 audit(1571637833.071:56): avc: denied { node_bind } for pid=7912 comm="syz-executor.2" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 06:03:53 executing program 5: mknod$loop(&(0x7f0000000000)='./file1\x00', 0x6082, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) recvfrom(r1, &(0x7f0000000300)=""/136, 0x88, 0x60007142, &(0x7f00000003c0)=@llc={0x1a, 0x10e, 0xd9, 0x2, 0x7, 0x80, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x80) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f00000001c0)=""/203) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) umount2(&(0x7f0000000100)='.\x00', 0xa) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465962f6e62643000"], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='hfs\x00', 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x30e, 0x80) ioctl$BLKZEROOUT(r4, 0x127f, &(0x7f0000000180)={0x92, 0x2}) 06:03:53 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80000000080003, 0x20000000003c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="00fbf806401cf918209b417fffc1449b99068757cb77fe1fb81d8c5f625c999901b081ab40fb96f102d847772b42bd869ba0a45f11440e1fab00af563a6c9d6b22f0f24fc6883b27b46aa79b1807f4b2abd4fe830534ffd06e38938e036ad90d23d357529b6d0c248363ae9135dc1bad012ed2e61a569bce10d28ac62211d81273091ea6d6206f186d1f3aa7010fca91333d1155aa2c6a558cc5292ba2a4815246608805430e6bc896ce798a3cd1f73f86279a226490cedf66cf9a0bc1c51dab13ca39357dbe08129f0d3aa002f2f6d08545445dfd3e373c5de278c23b355a6d20ab0049429b44da2213401e7b01325d0e5c4a9e4208f770"], 0xf8, 0x1) ustat(0x3, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c65ff206b657972696e67202475736572657468317b6c6f3a0a134d2c3453a3db4b765e21ae3310b04a97955839e9e97ce862357a4547ffb78d7bd27003c11bd1f30876f7a79687f9f8ea4047658cf0ff19942e759354c1085798795aff12676f8a90ea96dacd14443cdeb94103d0d43e8eabfdc53f06cd745f2a7b74e4bf79bd6ba5f5384ad08f4ba218237de45d7fad2b9d"], 0x9a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) ioctl$ASHMEM_SET_NAME(r6, 0x41007701, &(0x7f0000000000)='usercpuset-\x00') [ 208.777657] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16531: comm syz-executor.5: corrupted xattr entries 06:03:53 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r6, &(0x7f0000000000)=ANY=[], 0x0) fcntl$setstatus(r0, 0x4, 0x44800) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x4000}]) 06:03:53 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)="8a", 0x1}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) fsetxattr(r1, &(0x7f0000000100)=@known='trusted.overlay.nlink\x00', &(0x7f0000000140)='vmnet1*\x00', 0x8, 0x2) delete_module(&(0x7f00000000c0)='vmnet1*\x00', 0x800) [ 208.834408] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16516: comm syz-executor.2: corrupted xattr entries [ 208.899186] x86/PAT: syz-executor.4:7941 map pfn RAM range req write-combining for [mem 0xa4a93000-0xa4a93fff], got write-back [ 208.906858] audit: type=1400 audit(1571637833.121:57): avc: denied { name_connect } for pid=7912 comm="syz-executor.2" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 208.937624] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16516: comm syz-executor.0: corrupted xattr entries 06:03:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r0 = socket$unix(0x1, 0x5, 0x0) r1 = syz_open_dev$swradio(0x0, 0x1, 0x2) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000380)=@req3={0x8, 0x1f, 0x6, 0x375, 0x4, 0x9, 0xea}, 0x1c) r2 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000440)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x0) dup3(r0, r2, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000200)=""/49) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000340)={0x28, 0x0, 0x1, {{0x0, 0x1, 0x2}}}, 0x28) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000240)=0xfff) r3 = syz_open_dev$swradio(0x0, 0x1, 0x2) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x3) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./Qile1\\\x00']) [ 208.966822] ================================================================== [ 208.972280] EXT4-fs error (device sda1): ext4_xattr_set_entry:1607: inode #16519: comm syz-executor.4: corrupted xattr entries [ 208.974408] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x175/0x250 [ 208.993365] Write of size 994 at addr ffff888072862fa0 by task syz-executor.3/7433 [ 209.001119] [ 209.002792] CPU: 0 PID: 7433 Comm: syz-executor.3 Not tainted 4.19.80 #0 [ 209.009736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.019078] Call Trace: [ 209.021660] dump_stack+0x172/0x1f0 [ 209.025280] ? __ext4_expand_extra_isize+0x175/0x250 [ 209.030380] print_address_description.cold+0x7c/0x20d [ 209.035655] ? __ext4_expand_extra_isize+0x175/0x250 [ 209.040749] kasan_report.cold+0x8c/0x2ba [ 209.044893] check_memory_region+0x123/0x190 [ 209.049301] memset+0x24/0x40 [ 209.052420] __ext4_expand_extra_isize+0x175/0x250 [ 209.057351] ext4_mark_inode_dirty+0x6f0/0x940 [ 209.061931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.067484] ? ext4_expand_extra_isize+0x550/0x550 [ 209.072416] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 209.077446] ? current_time+0xde/0x140 [ 209.081343] ? ext4_journal_check_start+0x18d/0x220 [ 209.086351] ext4_unlink+0xd21/0xff0 [ 209.090054] ? ext4_rmdir+0xc90/0xc90 [ 209.093928] ? selinux_inode_unlink+0x23/0x30 [ 209.098408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.103950] vfs_unlink+0x2d3/0x500 [ 209.107564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.113089] do_unlinkat+0x3f7/0x6d0 [ 209.116801] ? __ia32_sys_rmdir+0x40/0x40 [ 209.120944] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.126478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.132013] ? getname_flags+0x277/0x5b0 [ 209.136077] __x64_sys_unlink+0x42/0x50 [ 209.140041] do_syscall_64+0xfd/0x620 [ 209.143830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.149010] RIP: 0033:0x4597a7 [ 209.152189] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.171180] RSP: 002b:00007ffe360fa4f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 209.178874] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597a7 [ 209.186133] RDX: 00007ffe360fa510 RSI: 00007ffe360fa510 RDI: 00007ffe360fa5a0 [ 209.193400] RBP: 000000000000002e R08: 0000000000000000 R09: 000000000000000b [ 209.200652] R10: 0000000000000006 R11: 0000000000000246 R12: 00007ffe360fb630 [ 209.208012] R13: 0000000002849940 R14: 0000000000000000 R15: 00007ffe360fb630 [ 209.215284] [ 209.216896] The buggy address belongs to the page: [ 209.221817] page:ffffea0001ca1880 count:2 mapcount:0 mapping:ffff8880a6f6eb18 index:0x42e [ 209.230124] flags: 0x1fffc0000001074(referenced|dirty|lru|active|private) [ 209.237036] raw: 01fffc0000001074 ffffea0001551f48 ffff8880829db230 ffff8880a6f6eb18 [ 209.245336] raw: 000000000000042e ffff888094997348 00000002ffffffff ffff88808b0cc000 [ 209.253195] page dumped because: kasan: bad access detected [ 209.258901] page->mem_cgroup:ffff88808b0cc000 [ 209.264334] [ 209.265962] Memory state around the buggy address: [ 209.270881] ffff888072862f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 209.278223] ffff888072862f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 209.285565] >ffff888072863000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 209.292907] ^ [ 209.296268] ffff888072863080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 209.303610] ffff888072863100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 209.310963] ================================================================== [ 209.318312] Disabling lock debugging due to kernel taint [ 209.324515] Kernel panic - not syncing: panic_on_warn set ... [ 209.324515] [ 209.331893] CPU: 0 PID: 7433 Comm: syz-executor.3 Tainted: G B 4.19.80 #0 [ 209.340107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.349460] Call Trace: [ 209.352042] dump_stack+0x172/0x1f0 [ 209.355656] ? __ext4_expand_extra_isize+0x175/0x250 [ 209.360744] panic+0x26a/0x50e [ 209.363920] ? __warn_printk+0xf3/0xf3 [ 209.367791] ? __ext4_expand_extra_isize+0x175/0x250 [ 209.372877] ? preempt_schedule+0x4b/0x60 [ 209.377009] ? ___preempt_schedule+0x16/0x18 [ 209.381401] ? trace_hardirqs_on+0x5e/0x220 [ 209.385722] ? __ext4_expand_extra_isize+0x175/0x250 [ 209.390823] kasan_end_report+0x47/0x4f [ 209.394789] kasan_report.cold+0xa9/0x2ba [ 209.398920] check_memory_region+0x123/0x190 [ 209.403310] memset+0x24/0x40 [ 209.406400] __ext4_expand_extra_isize+0x175/0x250 [ 209.411313] ext4_mark_inode_dirty+0x6f0/0x940 [ 209.415896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.421445] ? ext4_expand_extra_isize+0x550/0x550 [ 209.426374] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 209.431490] ? current_time+0xde/0x140 [ 209.435372] ? ext4_journal_check_start+0x18d/0x220 [ 209.440388] ext4_unlink+0xd21/0xff0 [ 209.444095] ? ext4_rmdir+0xc90/0xc90 [ 209.447897] ? selinux_inode_unlink+0x23/0x30 [ 209.452379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.457904] vfs_unlink+0x2d3/0x500 [ 209.461517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.467309] do_unlinkat+0x3f7/0x6d0 [ 209.471022] ? __ia32_sys_rmdir+0x40/0x40 [ 209.475170] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.480689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.486208] ? getname_flags+0x277/0x5b0 [ 209.490254] __x64_sys_unlink+0x42/0x50 [ 209.494213] do_syscall_64+0xfd/0x620 [ 209.497996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.503170] RIP: 0033:0x4597a7 [ 209.506347] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.525233] RSP: 002b:00007ffe360fa4f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 209.532926] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597a7 [ 209.540178] RDX: 00007ffe360fa510 RSI: 00007ffe360fa510 RDI: 00007ffe360fa5a0 [ 209.547430] RBP: 000000000000002e R08: 0000000000000000 R09: 000000000000000b [ 209.554697] R10: 0000000000000006 R11: 0000000000000246 R12: 00007ffe360fb630 [ 209.561950] R13: 0000000002849940 R14: 0000000000000000 R15: 00007ffe360fb630 [ 209.570701] Kernel Offset: disabled [ 209.574325] Rebooting in 86400 seconds..