[ 44.088921] audit: type=1800 audit(1555004637.114:30): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 59.846887] kauditd_printk_skb: 4 callbacks suppressed [ 59.846903] audit: type=1400 audit(1555004652.904:35): avc: denied { map } for pid=7881 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.242' (ECDSA) to the list of known hosts. 2019/04/11 17:44:19 fuzzer started [ 66.551020] audit: type=1400 audit(1555004659.604:36): avc: denied { map } for pid=7890 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/04/11 17:44:22 dialing manager at 10.128.0.105:35537 2019/04/11 17:44:22 syscalls: 2428 2019/04/11 17:44:22 code coverage: enabled 2019/04/11 17:44:22 comparison tracing: enabled 2019/04/11 17:44:22 extra coverage: extra coverage is not supported by the kernel 2019/04/11 17:44:22 setuid sandbox: enabled 2019/04/11 17:44:22 namespace sandbox: enabled 2019/04/11 17:44:22 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/11 17:44:22 fault injection: enabled 2019/04/11 17:44:22 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/11 17:44:22 net packet injection: enabled 2019/04/11 17:44:22 net device setup: enabled 17:45:40 executing program 0: msgget$private(0x0, 0x40a) r0 = msgget(0x1, 0x2) msgctl$IPC_RMID(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="ce00000007000000c8b86b3f7b63e507a14386fbbf0ea1b072761aa1b6a9ac59e38347b75d3b345e01a1b519273966b2c9aa568f0000000001e9a995d6704982cead657be0ba4e084ce1f4b7c9b26dde04f796e67e7e1e119624c85ebfc7c098810055c3ef3241b80a6cbe79a163715c59009d2c8b4bc46309e8f3c53f42c2f64844881f86d937d63e1ee1530d9607c3733ae3163b397e993d30531806e618d4f7f4bfca88d7043f0cd25798d9680cad05baab8d5ff3efc6fda1efbf8b1c953363a50800000004d465331eb159b2144352ae016dc383"], 0x0, 0x1400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r3 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4000000020000000) r4 = getpgid(0xffffffffffffffff) r5 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2}) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000000000029000ac141400ac1414bb1200907800"/54], 0x0) [ 147.321112] audit: type=1400 audit(1555004740.374:37): avc: denied { map } for pid=7907 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14950 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 147.423011] IPVS: ftp: loaded support on port[0] = 21 17:45:40 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) [ 147.572650] chnl_net:caif_netlink_parms(): no params data found [ 147.671095] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.676325] IPVS: ftp: loaded support on port[0] = 21 [ 147.677990] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.694606] device bridge_slave_0 entered promiscuous mode [ 147.703251] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.710845] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.718547] device bridge_slave_1 entered promiscuous mode [ 147.755079] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.772249] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.802198] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 147.812072] team0: Port device team_slave_0 added [ 147.820549] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 147.829451] team0: Port device team_slave_1 added [ 147.838012] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 17:45:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x15, &(0x7f00000000c0)={0x0, 'team_slave_0\x00'}, 0x18) [ 147.847385] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 147.938292] device hsr_slave_0 entered promiscuous mode [ 147.986067] device hsr_slave_1 entered promiscuous mode [ 148.026960] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 148.034288] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 148.050986] IPVS: ftp: loaded support on port[0] = 21 17:45:41 executing program 3: msgget$private(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4000000020000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0x0, 0x4c00}}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) [ 148.109916] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.116616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.123715] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.130303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.212325] chnl_net:caif_netlink_parms(): no params data found [ 148.361580] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.369556] IPVS: ftp: loaded support on port[0] = 21 [ 148.376204] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.383657] device bridge_slave_0 entered promiscuous mode [ 148.403360] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 148.410396] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.423158] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.430647] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.438511] device bridge_slave_1 entered promiscuous mode 17:45:41 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0xd, &(0x7f0000000000)={0x0, 'team_slave_0\x00', 0x1}, 0x18) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000200)={0x2, "59fe95d5ae063d154daf9b12d8ac77495e5565b6a1812493453b8ebd449c293a", 0x0, 0x10, 0x81, 0xfff, 0x1d, 0x0, 0xffffffffffff94b3, 0xfffffffffffffffc}) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000000c0)={0x100000000, 0x0, [], {0x0, @reserved}}) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000180)={0x1, 'yam0\x00', 0x1}, 0x18) [ 148.456759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 148.526637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.544038] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.575070] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.596067] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 148.608902] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 148.615341] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.665866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 148.678253] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 148.680918] IPVS: ftp: loaded support on port[0] = 21 [ 148.686457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.700195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.710553] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.716995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.726906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.735784] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.744022] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.750505] bridge0: port 2(bridge_slave_1) entered forwarding state 17:45:41 executing program 5: r0 = open(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x20000000) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x2080, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) setitimer(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000240), 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc010643a, &(0x7f0000000700)={0x3e, 0x1}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, r4) ioctl$VIDIOC_SUBDEV_G_EDID(r5, 0xc0245628, 0x0) getsockname$packet(r5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x2040, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @multicast2}}}, 0x0) r6 = dup2(r2, r1) write$P9_RWSTAT(r6, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0xffffffffffffffff) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x800) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 148.770737] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.803183] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 148.818915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.836270] chnl_net:caif_netlink_parms(): no params data found [ 148.851080] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.865785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 148.879819] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 148.919672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.929383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.940128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.971086] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 148.981275] team0: Port device team_slave_0 added [ 148.987436] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 148.995366] team0: Port device team_slave_1 added [ 149.005681] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.021377] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 149.039448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 149.054014] IPVS: ftp: loaded support on port[0] = 21 [ 149.072058] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 149.107529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.117546] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.134520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 149.196901] device hsr_slave_0 entered promiscuous mode [ 149.255328] device hsr_slave_1 entered promiscuous mode [ 149.301951] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 149.312238] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 149.333577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.342567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.356577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 149.363995] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.370575] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.379407] device bridge_slave_0 entered promiscuous mode [ 149.413611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.422102] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.432675] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 149.439776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.452221] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.459495] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.467541] device bridge_slave_1 entered promiscuous mode [ 149.527060] chnl_net:caif_netlink_parms(): no params data found [ 149.561561] chnl_net:caif_netlink_parms(): no params data found [ 149.578402] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 149.590601] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 149.621136] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.640240] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 149.652156] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 149.659956] team0: Port device team_slave_0 added [ 149.666626] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 149.674390] team0: Port device team_slave_1 added [ 149.710398] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 149.720579] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 149.759152] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.766666] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.774007] device bridge_slave_0 entered promiscuous mode [ 149.782655] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.789548] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.796799] device bridge_slave_1 entered promiscuous mode [ 149.858328] device hsr_slave_0 entered promiscuous mode [ 149.905700] device hsr_slave_1 entered promiscuous mode [ 149.957604] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.964123] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.972914] device bridge_slave_0 entered promiscuous mode [ 149.980850] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.987974] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.995935] device bridge_slave_1 entered promiscuous mode [ 150.016260] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.023462] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 150.052420] chnl_net:caif_netlink_parms(): no params data found [ 150.067682] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 150.086355] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 150.094865] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 150.103490] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 150.130566] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 150.142656] audit: type=1400 audit(1555004743.194:38): avc: denied { associate } for pid=7908 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 150.143917] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 150.173515] team0: Port device team_slave_0 added [ 150.235550] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 150.243326] team0: Port device team_slave_1 added [ 150.258666] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 150.266428] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 150.274022] team0: Port device team_slave_0 added [ 150.280421] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 150.288257] team0: Port device team_slave_1 added [ 150.300310] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 150.309745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 150.325529] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 150.340327] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.352012] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.361065] device bridge_slave_0 entered promiscuous mode [ 150.390291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 150.413054] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.421630] hrtimer: interrupt took 30451 ns [ 150.425625] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.433730] device bridge_slave_1 entered promiscuous mode [ 150.440817] audit: type=1400 audit(1555004743.494:39): avc: denied { name_bind } for pid=7930 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 150.472910] audit: type=1400 audit(1555004743.524:40): avc: denied { node_bind } for pid=7930 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 150.498403] audit: type=1400 audit(1555004743.534:41): avc: denied { name_connect } for pid=7930 comm="syz-executor.0" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 150.532006] device hsr_slave_0 entered promiscuous mode [ 150.538313] audit: type=1400 audit(1555004743.584:42): avc: denied { create } for pid=7930 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 150.564441] audit: type=1400 audit(1555004743.594:43): avc: denied { write } for pid=7930 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 17:45:43 executing program 0: msgget$private(0x0, 0x40a) r0 = msgget(0x1, 0x2) msgctl$IPC_RMID(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="ce00000007000000c8b86b3f7b63e507a14386fbbf0ea1b072761aa1b6a9ac59e38347b75d3b345e01a1b519273966b2c9aa568f0000000001e9a995d6704982cead657be0ba4e084ce1f4b7c9b26dde04f796e67e7e1e119624c85ebfc7c098810055c3ef3241b80a6cbe79a163715c59009d2c8b4bc46309e8f3c53f42c2f64844881f86d937d63e1ee1530d9607c3733ae3163b397e993d30531806e618d4f7f4bfca88d7043f0cd25798d9680cad05baab8d5ff3efc6fda1efbf8b1c953363a50800000004d465331eb159b2144352ae016dc383"], 0x0, 0x1400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r3 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4000000020000000) r4 = getpgid(0xffffffffffffffff) r5 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2}) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000000000029000ac141400ac1414bb1200907800"/54], 0x0) [ 150.589044] audit: type=1400 audit(1555004743.594:44): avc: denied { read } for pid=7930 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 150.625142] device hsr_slave_1 entered promiscuous mode [ 150.656577] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 150.724018] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.732120] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 17:45:43 executing program 0: msgget$private(0x0, 0x40a) r0 = msgget(0x1, 0x2) msgctl$IPC_RMID(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="ce00000007000000c8b86b3f7b63e507a14386fbbf0ea1b072761aa1b6a9ac59e38347b75d3b345e01a1b519273966b2c9aa568f0000000001e9a995d6704982cead657be0ba4e084ce1f4b7c9b26dde04f796e67e7e1e119624c85ebfc7c098810055c3ef3241b80a6cbe79a163715c59009d2c8b4bc46309e8f3c53f42c2f64844881f86d937d63e1ee1530d9607c3733ae3163b397e993d30531806e618d4f7f4bfca88d7043f0cd25798d9680cad05baab8d5ff3efc6fda1efbf8b1c953363a50800000004d465331eb159b2144352ae016dc383"], 0x0, 0x1400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r3 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4000000020000000) r4 = getpgid(0xffffffffffffffff) r5 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2}) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000000000029000ac141400ac1414bb1200907800"/54], 0x0) [ 150.774039] device hsr_slave_0 entered promiscuous mode [ 150.825345] device hsr_slave_1 entered promiscuous mode [ 150.847949] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 150.859425] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 150.869818] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 17:45:44 executing program 0: msgget$private(0x0, 0x40a) r0 = msgget(0x1, 0x2) msgctl$IPC_RMID(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="ce00000007000000c8b86b3f7b63e507a14386fbbf0ea1b072761aa1b6a9ac59e38347b75d3b345e01a1b519273966b2c9aa568f0000000001e9a995d6704982cead657be0ba4e084ce1f4b7c9b26dde04f796e67e7e1e119624c85ebfc7c098810055c3ef3241b80a6cbe79a163715c59009d2c8b4bc46309e8f3c53f42c2f64844881f86d937d63e1ee1530d9607c3733ae3163b397e993d30531806e618d4f7f4bfca88d7043f0cd25798d9680cad05baab8d5ff3efc6fda1efbf8b1c953363a50800000004d465331eb159b2144352ae016dc383"], 0x0, 0x1400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r3 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4000000020000000) r4 = getpgid(0xffffffffffffffff) r5 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2}) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000000000029000ac141400ac1414bb1200907800"/54], 0x0) [ 150.897299] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 150.906046] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 150.916825] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 150.927399] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 150.933503] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.941255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.956116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.966782] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 150.996291] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 151.027095] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 151.045993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.054082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.070343] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.076937] bridge0: port 1(bridge_slave_0) entered forwarding state 17:45:44 executing program 0: msgget$private(0x0, 0x40a) r0 = msgget(0x1, 0x2) msgctl$IPC_RMID(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="ce00000007000000c8b86b3f7b63e507a14386fbbf0ea1b072761aa1b6a9ac59e38347b75d3b345e01a1b519273966b2c9aa568f0000000001e9a995d6704982cead657be0ba4e084ce1f4b7c9b26dde04f796e67e7e1e119624c85ebfc7c098810055c3ef3241b80a6cbe79a163715c59009d2c8b4bc46309e8f3c53f42c2f64844881f86d937d63e1ee1530d9607c3733ae3163b397e993d30531806e618d4f7f4bfca88d7043f0cd25798d9680cad05baab8d5ff3efc6fda1efbf8b1c953363a50800000004d465331eb159b2144352ae016dc383"], 0x0, 0x1400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r3 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4000000020000000) r4 = getpgid(0xffffffffffffffff) r5 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2}) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000000000029000ac141400ac1414bb1200907800"/54], 0x0) [ 151.104459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 151.129394] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.150579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.159058] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.183924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 17:45:44 executing program 0: msgget$private(0x0, 0x40a) r0 = msgget(0x1, 0x2) msgctl$IPC_RMID(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="ce00000007000000c8b86b3f7b63e507a14386fbbf0ea1b072761aa1b6a9ac59e38347b75d3b345e01a1b519273966b2c9aa568f0000000001e9a995d6704982cead657be0ba4e084ce1f4b7c9b26dde04f796e67e7e1e119624c85ebfc7c098810055c3ef3241b80a6cbe79a163715c59009d2c8b4bc46309e8f3c53f42c2f64844881f86d937d63e1ee1530d9607c3733ae3163b397e993d30531806e618d4f7f4bfca88d7043f0cd25798d9680cad05baab8d5ff3efc6fda1efbf8b1c953363a50800000004d465331eb159b2144352ae016dc383"], 0x0, 0x1400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r3 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4000000020000000) r4 = getpgid(0xffffffffffffffff) r5 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2}) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000000000029000ac141400ac1414bb1200907800"/54], 0x0) [ 151.200426] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.206992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.222211] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 151.230565] team0: Port device team_slave_0 added [ 151.270471] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 151.283858] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 151.291776] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 151.300897] team0: Port device team_slave_1 added [ 151.311356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 151.327151] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 151.349849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.357405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.365228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 151.376180] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 151.382356] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.390568] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 151.403662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.412727] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 151.425063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 17:45:44 executing program 0: msgget$private(0x0, 0x40a) r0 = msgget(0x1, 0x2) msgctl$IPC_RMID(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="ce00000007000000c8b86b3f7b63e507a14386fbbf0ea1b072761aa1b6a9ac59e38347b75d3b345e01a1b519273966b2c9aa568f0000000001e9a995d6704982cead657be0ba4e084ce1f4b7c9b26dde04f796e67e7e1e119624c85ebfc7c098810055c3ef3241b80a6cbe79a163715c59009d2c8b4bc46309e8f3c53f42c2f64844881f86d937d63e1ee1530d9607c3733ae3163b397e993d30531806e618d4f7f4bfca88d7043f0cd25798d9680cad05baab8d5ff3efc6fda1efbf8b1c953363a50800000004d465331eb159b2144352ae016dc383"], 0x0, 0x1400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r3 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4000000020000000) r4 = getpgid(0xffffffffffffffff) r5 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2}) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000000000029000ac141400ac1414bb1200907800"/54], 0x0) [ 151.453900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 151.462785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.471155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.479686] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.486185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.490894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.506665] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 151.525050] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 17:45:44 executing program 0: msgget$private(0x0, 0x40a) r0 = msgget(0x1, 0x2) msgctl$IPC_RMID(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="ce00000007000000c8b86b3f7b63e507a14386fbbf0ea1b072761aa1b6a9ac59e38347b75d3b345e01a1b519273966b2c9aa568f0000000001e9a995d6704982cead657be0ba4e084ce1f4b7c9b26dde04f796e67e7e1e119624c85ebfc7c098810055c3ef3241b80a6cbe79a163715c59009d2c8b4bc46309e8f3c53f42c2f64844881f86d937d63e1ee1530d9607c3733ae3163b397e993d30531806e618d4f7f4bfca88d7043f0cd25798d9680cad05baab8d5ff3efc6fda1efbf8b1c953363a50800000004d465331eb159b2144352ae016dc383"], 0x0, 0x1400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r3 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4000000020000000) r4 = getpgid(0xffffffffffffffff) r5 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2}) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000000000029000ac141400ac1414bb1200907800"/54], 0x0) [ 151.570205] device hsr_slave_0 entered promiscuous mode [ 151.618283] device hsr_slave_1 entered promiscuous mode [ 151.645592] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 151.652880] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 151.668348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 151.682482] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 151.699627] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 151.712519] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 151.730799] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 151.746336] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 151.756496] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 151.763173] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.784620] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 151.794984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.803388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.818433] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.824905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.833319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.840771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.848105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 151.856316] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 151.868466] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 151.878490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 151.893367] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 151.901360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 151.910282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.918798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.926901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.934869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.949480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 151.967986] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.976921] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 151.983278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 151.990923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.000089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.007960] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.014469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.021958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.037076] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 152.053510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 152.061563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 152.070415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.078859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.087466] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.093813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.102720] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 152.110965] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 152.120968] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 152.134230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 152.142609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 152.151682] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 152.161657] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 152.173908] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 152.188796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.197241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.204506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 152.214377] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 152.226597] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 152.237831] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 152.246492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 152.254427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 152.262835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 152.271273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.279610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.287799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 152.298126] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 152.304410] 8021q: adding VLAN 0 to HW filter on device team0 [ 152.313554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 152.326952] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 152.337861] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 152.343928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 152.359553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 152.367508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.380506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 152.390598] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 152.408039] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.426447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.434303] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.440827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.449584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 17:45:45 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) [ 152.458073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 152.469196] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 152.481329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 152.508785] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 152.529654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.545579] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 152.558702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.567037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.580965] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.587414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.594436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 152.606173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 152.621023] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.631807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 152.643558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 152.652718] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 152.661269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.670081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.677977] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 152.689194] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 152.703789] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 152.713926] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 152.725874] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 152.732059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 152.741319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 152.749981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.760114] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 152.769141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 152.779872] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 152.817303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.824480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.840946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 152.852879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 17:45:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=ANY=[], 0x0) [ 152.868231] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 152.877913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 152.903802] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 152.925586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 152.933685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 152.955783] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 152.961945] 8021q: adding VLAN 0 to HW filter on device team0 [ 152.977779] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 152.991350] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 153.001640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.010406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.018511] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.024942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.037810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 153.049615] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 153.058064] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 153.068762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.076758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.100593] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 153.114275] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 153.130997] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 153.143804] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 153.151086] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 153.164455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.181103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.190724] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.197383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.205650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.213457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.225200] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 153.239716] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 153.251441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 153.263064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 153.280217] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 153.289744] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 153.298388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 153.306919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 153.319901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 153.326968] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 153.337706] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 153.345821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 153.354004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 153.373571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 153.387611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.401278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.413471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 153.420790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.433859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.446884] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 153.452994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 153.487866] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 153.500870] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 153.555861] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 17:45:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x80086603, 0x400007) 17:45:46 executing program 0: msgget$private(0x0, 0x40a) r0 = msgget(0x1, 0x2) msgctl$IPC_RMID(r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="ce00000007000000c8b86b3f7b63e507a14386fbbf0ea1b072761aa1b6a9ac59e38347b75d3b345e01a1b519273966b2c9aa568f0000000001e9a995d6704982cead657be0ba4e084ce1f4b7c9b26dde04f796e67e7e1e119624c85ebfc7c098810055c3ef3241b80a6cbe79a163715c59009d2c8b4bc46309e8f3c53f42c2f64844881f86d937d63e1ee1530d9607c3733ae3163b397e993d30531806e618d4f7f4bfca88d7043f0cd25798d9680cad05baab8d5ff3efc6fda1efbf8b1c953363a50800000004d465331eb159b2144352ae016dc383"], 0x0, 0x1400) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x4001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r3 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, 0x0, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4000000020000000) r4 = getpgid(0xffffffffffffffff) r5 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2}) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r7 = accept4(r3, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000004c0)='NET_DM\x00') semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) sendmmsg(r7, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x0, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa000800450000280000000000029000ac141400ac1414bb1200907800"/54], 0x0) 17:45:46 executing program 5: r0 = open(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x20000000) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x2080, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) setitimer(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000240), 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc010643a, &(0x7f0000000700)={0x3e, 0x1}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, r4) ioctl$VIDIOC_SUBDEV_G_EDID(r5, 0xc0245628, 0x0) getsockname$packet(r5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x2040, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @multicast2}}}, 0x0) r6 = dup2(r2, r1) write$P9_RWSTAT(r6, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0xffffffffffffffff) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x800) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:45:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0), 0x4) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000640)={r1, r1, 0x3, 0x2}, 0x10) openat$cgroup_ro(r1, &(0x7f0000000380)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000a40)={'veth0_to_be\x00'}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[], @ANYRESDEC=r1], 0x1c}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) recvmsg(r2, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000480)=""/71, 0x47}, {&(0x7f0000000500)=""/5, 0x5}, {&(0x7f0000000540)=""/82, 0x52}, {0x0}, {&(0x7f0000000740)=""/173, 0xad}, {&(0x7f0000000800)=""/158, 0x9e}, {&(0x7f00000005c0)=""/120, 0x78}], 0x7, &(0x7f0000000940)=""/181, 0xb5}, 0x40002040) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 17:45:46 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:46 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x79d6efff40875baa) 17:45:46 executing program 3: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004980)=[{0x10, 0x1}], 0x10}, 0x0) 17:45:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x7, 0x1, 0x5, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x80000000}, 0x3c) 17:45:47 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x79d6efff40875baa) 17:45:47 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0), 0x4) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000640)={r1, r1, 0x3, 0x2}, 0x10) openat$cgroup_ro(r1, &(0x7f0000000380)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000a40)={'veth0_to_be\x00'}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[], @ANYRESDEC=r1], 0x1c}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) recvmsg(r2, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000480)=""/71, 0x47}, {&(0x7f0000000500)=""/5, 0x5}, {&(0x7f0000000540)=""/82, 0x52}, {0x0}, {&(0x7f0000000740)=""/173, 0xad}, {&(0x7f0000000800)=""/158, 0x9e}, {&(0x7f00000005c0)=""/120, 0x78}], 0x7, &(0x7f0000000940)=""/181, 0xb5}, 0x40002040) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 154.053938] audit: type=1400 audit(1555004747.104:45): avc: denied { map_create } for pid=8012 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 17:45:47 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000003c0)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xffffffffffffffff) socket$kcm(0x29, 0x7, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000a40)={'veth0_to_be\x00'}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r0], 0x14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[], 0x0) socketpair(0xa, 0x6, 0x2, 0x0) 17:45:47 executing program 4: 17:45:47 executing program 1: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:47 executing program 5: r0 = open(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x20000000) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x2080, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) setitimer(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000240), 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000004000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) ioctl$DRM_IOCTL_WAIT_VBLANK(r4, 0xc010643a, &(0x7f0000000700)={0x3e, 0x1}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, r4) ioctl$VIDIOC_SUBDEV_G_EDID(r5, 0xc0245628, 0x0) getsockname$packet(r5, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5}) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x2040, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20, @multicast2}}}, 0x0) r6 = dup2(r2, r1) write$P9_RWSTAT(r6, &(0x7f00000000c0)={0x7, 0x7f, 0x1}, 0x7) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0xffffffffffffffff) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x800) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:45:47 executing program 1: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:47 executing program 3: 17:45:47 executing program 4: 17:45:47 executing program 2: 17:45:47 executing program 4: 17:45:47 executing program 3: 17:45:47 executing program 1: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:47 executing program 4: 17:45:47 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000003c0)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xffffffffffffffff) socket$kcm(0x29, 0x7, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000a40)={'veth0_to_be\x00'}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r0], 0x14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[], 0x0) socketpair(0xa, 0x6, 0x2, 0x0) 17:45:47 executing program 2: 17:45:47 executing program 3: 17:45:48 executing program 5: 17:45:48 executing program 1: r0 = dup(0xffffffffffffffff) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:48 executing program 4: 17:45:48 executing program 2: 17:45:48 executing program 4: 17:45:48 executing program 3: 17:45:48 executing program 2: 17:45:48 executing program 5: 17:45:48 executing program 1: r0 = dup(0xffffffffffffffff) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:48 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000003c0)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xffffffffffffffff) socket$kcm(0x29, 0x7, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000a40)={'veth0_to_be\x00'}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r0], 0x14}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[], 0x0) socketpair(0xa, 0x6, 0x2, 0x0) 17:45:48 executing program 4: 17:45:48 executing program 3: 17:45:48 executing program 5: 17:45:48 executing program 2: 17:45:48 executing program 1: r0 = dup(0xffffffffffffffff) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:48 executing program 4: 17:45:48 executing program 3: 17:45:48 executing program 5: 17:45:48 executing program 2: 17:45:48 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:48 executing program 3: 17:45:49 executing program 0: 17:45:49 executing program 4: 17:45:49 executing program 5: 17:45:49 executing program 2: 17:45:49 executing program 3: 17:45:49 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:49 executing program 4: 17:45:49 executing program 4: 17:45:49 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:49 executing program 5: 17:45:49 executing program 3: 17:45:49 executing program 2: 17:45:49 executing program 0: 17:45:49 executing program 4: 17:45:49 executing program 5: 17:45:49 executing program 2: 17:45:49 executing program 0: 17:45:49 executing program 3: 17:45:49 executing program 4: 17:45:49 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:49 executing program 5: 17:45:49 executing program 0: 17:45:49 executing program 2: 17:45:49 executing program 4: 17:45:49 executing program 3: 17:45:49 executing program 5: 17:45:49 executing program 4: 17:45:49 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:49 executing program 3: 17:45:49 executing program 2: 17:45:49 executing program 0: 17:45:49 executing program 5: 17:45:49 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:50 executing program 4: 17:45:50 executing program 3: 17:45:50 executing program 0: 17:45:50 executing program 2: 17:45:50 executing program 0: 17:45:50 executing program 4: 17:45:50 executing program 5: 17:45:50 executing program 1: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r0 = dup(0xffffffffffffffff) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:50 executing program 2: 17:45:50 executing program 3: 17:45:50 executing program 5: 17:45:50 executing program 4: 17:45:50 executing program 0: 17:45:50 executing program 3: 17:45:50 executing program 2: r0 = socket(0x11, 0xa, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20040000}, 0x4000) 17:45:50 executing program 1: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r0 = dup(0xffffffffffffffff) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:50 executing program 5: 17:45:50 executing program 0: 17:45:50 executing program 4: 17:45:50 executing program 3: 17:45:50 executing program 1: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r0 = dup(0xffffffffffffffff) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:50 executing program 5: 17:45:50 executing program 0: 17:45:50 executing program 2: 17:45:50 executing program 4: 17:45:50 executing program 3: 17:45:50 executing program 5: 17:45:50 executing program 2: 17:45:50 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) dup(r0) ppoll(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 17:45:50 executing program 0: 17:45:50 executing program 4: 17:45:50 executing program 5: 17:45:51 executing program 3: 17:45:51 executing program 4: 17:45:51 executing program 0: 17:45:51 executing program 5: 17:45:51 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000040)="47bb21", 0x3, 0x0, 0x0, 0x0) 17:45:51 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) dup(r0) ppoll(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 17:45:51 executing program 3: 17:45:51 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) dup(r0) ppoll(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 17:45:51 executing program 2: 17:45:51 executing program 5: 17:45:51 executing program 4: 17:45:51 executing program 0: 17:45:51 executing program 5: 17:45:51 executing program 4: 17:45:51 executing program 3: 17:45:51 executing program 0: 17:45:51 executing program 2: 17:45:51 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) dup(r0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) 17:45:51 executing program 0: 17:45:51 executing program 3: 17:45:51 executing program 2: 17:45:51 executing program 4: 17:45:51 executing program 5: 17:45:51 executing program 0: 17:45:51 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) dup(r0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) 17:45:51 executing program 2: 17:45:51 executing program 3: 17:45:51 executing program 5: 17:45:51 executing program 4: 17:45:51 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) dup(r0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x0, 0x0) 17:45:51 executing program 2: 17:45:52 executing program 0: 17:45:52 executing program 5: 17:45:52 executing program 3: 17:45:52 executing program 4: 17:45:52 executing program 2: 17:45:52 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) dup(r0) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:52 executing program 5: 17:45:52 executing program 3: 17:45:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, r0, 0x0, 0x175604ea) 17:45:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000100)="0adc1f123c12a41d88b070") r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(r0, r1) 17:45:52 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = dup2(r0, r0) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) 17:45:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:52 executing program 5: 17:45:52 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) dup(r0) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, r0, 0x0, 0x175604ea) 17:45:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000100)="0adc1f123c12a41d88b070") r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(r0, r1) 17:45:52 executing program 2: 17:45:52 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:52 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) dup(r0) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040), 0x0, 0x0) 17:45:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000100)="0adc1f123c12a41d88b070") r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(r0, r1) 17:45:52 executing program 2: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0x4000, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:45:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, r0, 0x0, 0x175604ea) 17:45:52 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:52 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) 17:45:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000100)="0adc1f123c12a41d88b070") r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(r0, r1) 17:45:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:52 executing program 2: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0x4000, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:45:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, r0, 0x0, 0x175604ea) 17:45:53 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000100)="0adc1f123c12a41d88b070") dup2(r0, 0xffffffffffffffff) 17:45:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000180)) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000000c0)={0x5, 0x8, 0x1, 0x2, 0xe6}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x16}]}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\xfe', 0x1ff) 17:45:53 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x175604ea) 17:45:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000100)="0adc1f123c12a41d88b070") dup2(r0, 0xffffffffffffffff) 17:45:53 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:53 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) 17:45:53 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x175604ea) 17:45:53 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:53 executing program 5: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000100)="0adc1f123c12a41d88b070") dup2(r0, 0xffffffffffffffff) 17:45:53 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x175604ea) 17:45:53 executing program 5: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000180)) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000000c0)={0x5, 0x8, 0x1, 0x2, 0xe6}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x16}]}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\xfe', 0x1ff) 17:45:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(r0, r1) 17:45:54 executing program 5: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x175604ea) 17:45:54 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:54 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 17:45:54 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:54 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x2) r1 = dup(r0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) 17:45:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x175604ea) 17:45:54 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000180)) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000000c0)={0x5, 0x8, 0x1, 0x2, 0xe6}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x16}]}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\xfe', 0x1ff) 17:45:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x175604ea) 17:45:54 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:54 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 17:45:54 executing program 5: r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x175604ea) 17:45:54 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 17:45:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) [ 161.899739] audit: type=1400 audit(1555004754.954:46): avc: denied { create } for pid=8528 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 161.973617] audit: type=1400 audit(1555004755.004:47): avc: denied { write } for pid=8528 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 17:45:55 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x175604ea) 17:45:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) dup2(r0, r1) 17:45:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) 17:45:55 executing program 1: r0 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000180)="da", 0x1}], 0x1, 0x81806) 17:45:55 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) dup2(r0, r1) 17:45:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x175604ea) 17:45:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) 17:45:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,uquota,logbsize=e?m']) 17:45:55 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x0, 0x0, @initdev}, 0x1c) 17:45:55 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0xc0145401, &(0x7f0000000100)={{0x80000000001, 0x0, 0x0, 0x3}}) 17:45:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) dup2(r0, r1) 17:45:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x175604ea) 17:45:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) 17:45:55 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000780)='/dev/sg#\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) 17:45:55 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, 0x0) 17:45:55 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 17:45:55 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) 17:45:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x175604ea) 17:45:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:45:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x2, 0x2e8, [0x20000200, 0x0, 0x0, 0x20000230, 0x20000368], 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]}, 0x360) 17:45:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 17:45:56 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, 0x0) 17:45:56 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) 17:45:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x175604ea) 17:45:56 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) [ 163.188454] XFS (loop3): Invalid superblock magic number 17:45:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) 17:45:56 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, 0x0) 17:45:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x168, [0x20000240, 0x0, 0x0, 0x20000270, 0x200002a0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x1e0) 17:45:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, r0, 0x0, 0x0) 17:45:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:45:56 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x3}}) 17:45:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 17:45:56 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) 17:45:56 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2842, 0x0) close(r0) 17:45:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, r0, 0x0, 0x0) 17:45:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 17:45:56 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x3}}) 17:45:56 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2842, 0x0) close(r0) 17:45:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') sendfile(r0, r0, 0x0, 0x0) 17:45:56 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) [ 163.648054] XFS (loop3): Invalid superblock magic number 17:45:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) 17:45:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:45:56 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x3}}) 17:45:56 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2842, 0x0) close(r0) 17:45:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6=@initdev, 0x0, 0x0, 0x0, 0x4, 0xfa6, 0xa}}, 0xe8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(r0, &(0x7f0000000000), 0x1c) 17:45:57 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001}}) 17:45:57 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800", @ANYRES32=0x0], 0x24}}, 0x0) 17:45:57 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0xe0ef}) 17:45:57 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2842, 0x0) close(r0) [ 164.070764] XFS (loop3): Invalid superblock magic number 17:45:57 executing program 0: 17:45:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[]) 17:45:57 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001}}) 17:45:57 executing program 4: 17:45:57 executing program 1: close(0xffffffffffffffff) 17:45:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 17:45:57 executing program 0: 17:45:57 executing program 4: 17:45:57 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000100)={{0x80000000001}}) [ 164.359091] XFS (loop3): Invalid superblock magic number 17:45:57 executing program 1: close(0xffffffffffffffff) 17:45:57 executing program 0: 17:45:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[]) 17:45:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 17:45:57 executing program 5: 17:45:57 executing program 4: 17:45:57 executing program 1: close(0xffffffffffffffff) 17:45:57 executing program 0: 17:45:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 17:45:57 executing program 4: 17:45:57 executing program 5: [ 164.773496] XFS (loop3): Invalid superblock magic number 17:45:57 executing program 0: 17:45:57 executing program 4: 17:45:57 executing program 5: 17:45:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[]) 17:45:58 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2842, 0x0) close(r0) 17:45:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) 17:45:58 executing program 0: 17:45:58 executing program 4: 17:45:58 executing program 5: 17:45:58 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2842, 0x0) close(r0) 17:45:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) 17:45:58 executing program 4: 17:45:58 executing program 0: [ 165.199485] XFS (loop3): Invalid superblock magic number 17:45:58 executing program 5: 17:45:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, 0x0}, 0x0) 17:45:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB]) 17:45:58 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2842, 0x0) close(r0) 17:45:58 executing program 4: 17:45:58 executing program 0: 17:45:58 executing program 5: 17:45:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 17:45:58 executing program 0: 17:45:58 executing program 4: 17:45:58 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2842, 0x0) close(0xffffffffffffffff) 17:45:58 executing program 5: [ 165.569424] XFS (loop3): Invalid superblock magic number 17:45:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB]) 17:45:58 executing program 0: 17:45:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 17:45:58 executing program 5: 17:45:58 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2842, 0x0) close(0xffffffffffffffff) 17:45:58 executing program 4: 17:45:58 executing program 0: 17:45:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 17:45:59 executing program 5: 17:45:59 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2842, 0x0) close(0xffffffffffffffff) [ 165.988454] XFS (loop3): Invalid superblock magic number 17:45:59 executing program 5: 17:45:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB]) 17:45:59 executing program 4: 17:45:59 executing program 0: 17:45:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800"], 0x20}}, 0x0) 17:45:59 executing program 5: 17:45:59 executing program 0: 17:45:59 executing program 1: 17:45:59 executing program 4: 17:45:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800"], 0x20}}, 0x0) 17:45:59 executing program 5: 17:45:59 executing program 1: 17:45:59 executing program 0: [ 166.393925] XFS (loop3): Invalid superblock magic number 17:45:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pq']) 17:45:59 executing program 4: 17:45:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff000000000000000000000000080015000000000008000800"], 0x20}}, 0x0) 17:45:59 executing program 0: 17:45:59 executing program 1: 17:45:59 executing program 5: [ 166.656989] XFS (loop3): unknown mount option [pq]. 17:45:59 executing program 4: 17:45:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES32=0x0], 0x4}}, 0x0) 17:45:59 executing program 1: 17:45:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pq']) 17:45:59 executing program 0: 17:45:59 executing program 5: 17:45:59 executing program 4: [ 166.891165] XFS (loop3): unknown mount option [pq]. 17:46:00 executing program 1: 17:46:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES32=0x0], 0x4}}, 0x0) 17:46:00 executing program 5: 17:46:00 executing program 4: 17:46:00 executing program 0: 17:46:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pq']) 17:46:00 executing program 1: 17:46:00 executing program 5: 17:46:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES32=0x0], 0x4}}, 0x0) 17:46:00 executing program 4: 17:46:00 executing program 0: [ 167.224114] XFS (loop3): unknown mount option [pq]. 17:46:00 executing program 1: 17:46:00 executing program 5: 17:46:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,inode32,u']) 17:46:00 executing program 0: 17:46:00 executing program 4: 17:46:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x4}}, 0x0) 17:46:00 executing program 1: [ 167.495085] XFS (loop3): unknown mount option [u]. 17:46:00 executing program 0: 17:46:00 executing program 5: 17:46:00 executing program 4: 17:46:00 executing program 1: 17:46:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x4}}, 0x0) 17:46:00 executing program 5: 17:46:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqn']) 17:46:00 executing program 1: 17:46:00 executing program 4: 17:46:00 executing program 0: 17:46:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x4}}, 0x0) 17:46:00 executing program 1: 17:46:00 executing program 5: [ 167.823652] XFS (loop3): unknown mount option [pqn]. 17:46:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") select(0x40, &(0x7f0000000200)={0x8}, 0x0, &(0x7f0000000280)={0x4, 0x9, 0x0, 0x0, 0x807, 0x10001, 0x7, 0x7fffffff}, &(0x7f00000002c0)={0x0, 0x2710}) 17:46:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") clock_adjtime(0xc00, 0x0) 17:46:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqn']) 17:46:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") syz_read_part_table(0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x1000}]) 17:46:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000fef000/0x2000)=nil, 0x4) 17:46:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 17:46:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff0000000000000000", @ANYRES32=0x0], 0x14}}, 0x0) [ 168.126855] XFS (loop3): unknown mount option [pqn]. 17:46:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="8907040000", 0x5) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x80}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") [ 168.160888] loop1: unable to read partition table 17:46:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") signalfd(0xffffffffffffffff, 0x0, 0x0) [ 168.195328] loop1: partition table beyond EOD, truncated [ 168.226142] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 17:46:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff0000000000000000", @ANYRES32=0x0], 0x14}}, 0x0) 17:46:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = semget$private(0x0, 0x1, 0x141) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000100)=""/232) 17:46:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqn']) [ 168.300005] __loop_clr_fd: partition scan of loop1 failed (rc=0) 17:46:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) 17:46:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff0000000000000000", @ANYRES32=0x0], 0x14}}, 0x0) [ 168.398156] loop1: unable to read partition table [ 168.403228] loop1: partition table beyond EOD, truncated [ 168.418921] XFS (loop3): unknown mount option [pqn]. 17:46:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce,']) [ 168.479066] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 17:46:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e0bcfec7be070") setuid(0xee01) setxattr$security_ima(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0) 17:46:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x8000) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000080)={0x7b, 0x0, [0x6, 0x8, 0x789acf64, 0xff]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01"], 0x1, 0x0) 17:46:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc86055e0bceec7be070") ioprio_set$pid(0x0, 0x0, 0x5) 17:46:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff00000000000000000000000008001500", @ANYRES32=0x0], 0x1c}}, 0x0) [ 168.650041] __loop_clr_fd: partition scan of loop1 failed (rc=0) [ 168.709401] XFS (loop3): Invalid superblock magic number 17:46:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) mremap(&(0x7f0000feb000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0xcb) 17:46:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0xcb) 17:46:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 17:46:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff00000000000000000000000008001500", @ANYRES32=0x0], 0x1c}}, 0x0) 17:46:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x814, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") 17:46:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqn']) 17:46:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff00000000000000000000000008001500", @ANYRES32=0x0], 0x1c}}, 0x0) 17:46:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e0bcfec7be070") setfsuid(0x0) 17:46:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sigaltstack(&(0x7f0000b27000/0x3000)=nil, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") madvise(&(0x7f0000b26000/0x3000)=nil, 0x3000, 0xca) [ 169.096882] FAT-fs (loop1): bogus number of reserved sectors [ 169.119722] XFS (loop3): unknown mount option [pqn]. [ 169.139871] FAT-fs (loop1): Can't find a valid FAT filesystem 17:46:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) madvise(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0xb) 17:46:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff0000000000000000000000000800150000000000", @ANYRES32=0x0], 0x20}}, 0x0) 17:46:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqn']) 17:46:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000080)="480000001400197f09004b0101048c590a88ffffff00000100000028213ee20600d4ffdce606d483aa817ef347375bffff00c7e5ed5e00000000000000000000eaf60d7a9eace3db", 0x48}], 0x1) 17:46:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") get_robust_list(0x0, &(0x7f0000000240)=0x0, &(0x7f0000000280)) 17:46:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f0000feb000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) 17:46:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8) [ 169.425884] XFS (loop3): unknown mount option [pqn]. 17:46:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff0000000000000000000000000800150000000000", @ANYRES32=0x0], 0x20}}, 0x0) 17:46:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqn']) 17:46:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") io_submit(0x0, 0x96485e9842301d6f, &(0x7f0000b4b000)) 17:46:02 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000340)='TRUE', 0x4, 0x0) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000340), 0x0) mknod(&(0x7f0000000140)='./file1\x00', 0x29c, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 17:46:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$P9_RXATTRWALK(r2, 0x0, 0x0) 17:46:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") getsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) 17:46:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff0000000000000000000000000800150000000000", @ANYRES32=0x0], 0x20}}, 0x0) [ 169.676947] XFS (loop3): unknown mount option [pqn]. 17:46:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca5055e0bcfec7be070") prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) 17:46:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenfo']) 17:46:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000b22000/0x1000)=nil) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000b22000/0x3000)=nil) 17:46:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") bpf$BPF_PROG_QUERY(0x8, 0x0, 0x0) 17:46:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff00000000000000000000000008001500000000000800", @ANYRES32=0x0], 0x22}}, 0x0) [ 169.890847] XFS (loop3): unknown mount option [pqnoenfo]. 17:46:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000002c0)=0x400100000001, 0xfd) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2502001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto(r1, 0x0, 0x0, 0x1ffffffb, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80) 17:46:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$nbd(r2, 0x0, 0x0) 17:46:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff00000000000000000000000008001500000000000800", @ANYRES32=0x0], 0x22}}, 0x0) 17:46:03 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000340)='TRUE', 0x4, 0x0) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000340), 0x0) mknod(&(0x7f0000000140)='./file1\x00', 0x29c, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 17:46:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) 17:46:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenfo']) 17:46:03 executing program 1: r0 = creat(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r0) dup2(r1, r0) clone(0x2102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) 17:46:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff00000000000000000000000008001500000000000800", @ANYRES32=0x0], 0x22}}, 0x0) 17:46:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x61) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_open_pts(r0, 0x0) write$P9_RATTACH(r1, 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f00000001c0)) 17:46:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff0000000000000000000000000800150000000000080008", @ANYRES32=0x0], 0x23}}, 0x0) 17:46:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x14c) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000100), 0x4) [ 170.621414] XFS (loop3): unknown mount option [pqnoenfo]. 17:46:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenfo']) 17:46:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff0000000000000000000000000800150000000000080008", @ANYRES32=0x0], 0x23}}, 0x0) 17:46:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) write$P9_ROPEN(r2, 0x0, 0x0) [ 170.799207] XFS (loop3): unknown mount option [pqnoenfo]. 17:46:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforc']) [ 171.005513] XFS (loop3): unknown mount option [pqnoenforc]. 17:46:04 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000340)='TRUE', 0x4, 0x0) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000340), 0x0) mknod(&(0x7f0000000140)='./file1\x00', 0x29c, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 17:46:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000000201ffff0000000000000000000000000800150000000000080008", @ANYRES32=0x0], 0x23}}, 0x0) 17:46:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) getsockname$inet(r2, 0x0, &(0x7f0000000080)) 17:46:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforc']) 17:46:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000340)=@nfc={0x27, 0x1}, 0x80, 0x0}}], 0x1, 0x0) 17:46:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:46:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") sendto$unix(r1, 0x0, 0x0, 0x80020003ffc, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) mprotect(&(0x7f0000579000/0x3000)=nil, 0x3000, 0x0) [ 171.462627] audit: type=1400 audit(1555004764.514:48): avc: denied { getattr } for pid=9334 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 171.490773] XFS (loop3): unknown mount option [pqnoenforc]. 17:46:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup3(r0, r1, 0x0) getsockopt$sock_timeval(r2, 0x1, 0x14, 0x0, &(0x7f0000000100)) 17:46:04 executing program 0: 17:46:04 executing program 1: 17:46:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforc']) 17:46:04 executing program 1: [ 171.720412] audit: type=1400 audit(1555004764.774:49): avc: denied { getopt } for pid=9359 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 171.751688] XFS (loop3): unknown mount option [pqnoenforc]. 17:46:05 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000340)='TRUE', 0x4, 0x0) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000340), 0x0) mknod(&(0x7f0000000140)='./file1\x00', 0x29c, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 17:46:05 executing program 2: 17:46:05 executing program 0: 17:46:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforce']) 17:46:05 executing program 1: 17:46:05 executing program 1: [ 172.494112] XFS (loop3): Invalid superblock magic number 17:46:05 executing program 4: 17:46:05 executing program 0: 17:46:05 executing program 2: 17:46:05 executing program 1: 17:46:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforc']) 17:46:06 executing program 0: [ 172.929496] XFS (loop3): unknown mount option [pqnoenforc]. 17:46:06 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000340)='TRUE', 0x4, 0x0) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000340), 0x0) mknod(&(0x7f0000000140)='./file1\x00', 0x29c, 0x0) 17:46:06 executing program 1: 17:46:06 executing program 2: 17:46:06 executing program 4: 17:46:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforc']) 17:46:06 executing program 0: 17:46:06 executing program 1: 17:46:06 executing program 2: 17:46:06 executing program 0: 17:46:06 executing program 4: [ 173.301364] XFS (loop3): unknown mount option [pqnoenforc]. 17:46:06 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000340)='TRUE', 0x4, 0x0) execve(&(0x7f0000000180)='./file1\x00', &(0x7f0000000340), 0x0) 17:46:06 executing program 0: 17:46:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='noquota,uqnoenforce,pquota,inode32,pqnoenforc']) 17:46:06 executing program 1: 17:46:06 executing program 4: 17:46:06 executing program 2: 17:46:06 executing program 1: [ 173.572446] XFS (loop3): unknown mount option [pqnoenforc]. 17:46:06 executing program 4: 17:46:06 executing program 0: 17:46:06 executing program 2: 17:46:06 executing program 1: 17:46:06 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000340)='TRUE', 0x4, 0x0) 17:46:06 executing program 3: 17:46:06 executing program 4: 17:46:07 executing program 2: 17:46:07 executing program 0: 17:46:07 executing program 3: 17:46:07 executing program 1: 17:46:07 executing program 4: 17:46:07 executing program 2: 17:46:07 executing program 0: 17:46:07 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 17:46:07 executing program 3: 17:46:07 executing program 1: 17:46:07 executing program 0: 17:46:07 executing program 2: 17:46:07 executing program 4: 17:46:07 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000005c0)='./file0\x00', 0x1040, 0x0) 17:46:07 executing program 3: 17:46:07 executing program 1: 17:46:07 executing program 2: 17:46:07 executing program 0: 17:46:07 executing program 4: 17:46:07 executing program 2: 17:46:07 executing program 3: 17:46:07 executing program 4: 17:46:07 executing program 1: 17:46:07 executing program 0: 17:46:07 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) 17:46:07 executing program 2: 17:46:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) 17:46:07 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) dup2(r1, r0) 17:46:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 17:46:07 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) 17:46:07 executing program 5: clone(0x0, 0x0, 0x0, 0x0, 0x0) 17:46:07 executing program 2: shmat(0x0, &(0x7f0000002000/0x3000)=nil, 0x7000) 17:46:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$clear(0x7, r0) 17:46:08 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) [ 174.977633] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:46:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4000000080800) getsockopt(0xffffffffffffffff, 0x8, 0x7, &(0x7f0000000600)=""/146, &(0x7f0000000540)=0x92) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x484002}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x18, 0x0, 0x2, 0x3, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40010}, 0x40800) 17:46:08 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\'', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000240), 0x6) 17:46:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 17:46:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:08 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) 17:46:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:08 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) 17:46:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 17:46:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:08 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @empty}, 0x1c) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffe000/0x1000)=nil, 0x3000}, &(0x7f0000000080)=0xffffffffffffffd0) sendmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f00000000c0)=@hci, 0x80, &(0x7f0000001180), 0x0, &(0x7f0000002840)}}, {{&(0x7f0000001340)=@hci, 0x80, &(0x7f0000000140), 0x17b, &(0x7f0000000080)}}], 0x2, 0x0) 17:46:08 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 17:46:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4000000080800) getsockopt(0xffffffffffffffff, 0x8, 0x7, &(0x7f0000000600)=""/146, &(0x7f0000000540)=0x92) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x484002}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x18, 0x0, 0x2, 0x3, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40010}, 0x40800) 17:46:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:08 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 17:46:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:08 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 17:46:09 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000100)={'syz'}, 0x0) 17:46:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:09 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 17:46:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) 17:46:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, 0x0, 0x80, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 17:46:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4000000080800) getsockopt(0xffffffffffffffff, 0x8, 0x7, &(0x7f0000000600)=""/146, &(0x7f0000000540)=0x92) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x484002}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x18, 0x0, 0x2, 0x3, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40010}, 0x40800) 17:46:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:09 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 17:46:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:09 executing program 5: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000005c0)="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", 0xfc) 17:46:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:09 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 17:46:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 176.758121] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.5'. 17:46:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) 17:46:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:10 executing program 0: sigaltstack(&(0x7f0000383000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 17:46:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:10 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2f0000001d0081fd6d0000338f00000002dd0700060000001f5f03c9080001", 0x1f}], 0x1}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0x9f, &(0x7f00000001c0)}], 0x1, 0x0) 17:46:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000f9ff00000280000085000000ffffffe495"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) [ 177.050896] audit: type=1400 audit(1555004770.104:50): avc: denied { map_read map_write } for pid=9685 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 17:46:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) 17:46:10 executing program 5: r0 = memfd_create(&(0x7f0000000100)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00\x94k\x171\xb0\xb8B<\xefu \x13\x96a2i\xe28\x83\xe0Uh1\xa3>\xb2dk\xd8$6\x00Bn\xe7j!\x0fD\x97e\xac\xd1\xdaD\x9aDLE\xee\x9eT\x9a\x958', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 17:46:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 177.112999] audit: type=1400 audit(1555004770.104:51): avc: denied { prog_load } for pid=9685 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 17:46:10 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, 0x0) 17:46:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 177.287901] audit: type=1400 audit(1555004770.334:52): avc: denied { prog_run } for pid=9685 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 17:46:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) 17:46:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) 17:46:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x3a, 0x0, 0x0) 17:46:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0xfffffffffffffffd, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x2}) 17:46:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) 17:46:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) 17:46:11 executing program 4: mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:11 executing program 5: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x7000) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) shmdt(r0) [ 178.099502] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 17:46:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 17:46:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) 17:46:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 17:46:11 executing program 4: mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:46:11 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x3ff, 0x4) read(r0, &(0x7f0000000140)=""/104, 0x68) [ 178.822694] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 17:46:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000000)=@chain={'key_or_keyring:', r0, ':chain\x00'}) 17:46:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x1) 17:46:11 executing program 4: mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="2c00000004080501ff0080ffedfffbae3ee3fb000c0003002f00001c7d0a00010c0002000002fa17711104a6"], 0x2c}}, 0x0) 17:46:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 17:46:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000200)=0x81, 0x4) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_misc(r1, &(0x7f0000000fc0)={'syz0', "b9db052a964d758f95fe22a213b4bb238a8f5132d9c76559ac9ad554f9a5a30c9d8f5f83c1a8f46492b81ed2a8f0e1d9e72ee2214419b9552462ef400ad5925f174a91f21ddf69fd9f3167ab07e4557fecec5713f5d48b3e3a614c5435b253d64736a03ba1b38cfd6ddeb9def285cf82421bac8f6d7d6a282171c43256ec9d47c68c1c6aff876271f20d05408ed21feb67f25bea4277ec17d720fae549a7f1025734a2ac50e67947efa78c37be35425cf4596898ef146b26d43a6b9286ac2a4dac7e89c5be2c1a6f64"}, 0xcd) 17:46:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x1) [ 179.048005] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 17:46:12 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 179.095434] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 179.123169] kasan: CONFIG_KASAN_INLINE enabled [ 179.145736] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 179.163116] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 179.169423] CPU: 0 PID: 9787 Comm: syz-executor.5 Not tainted 4.19.34 #2 [ 179.176277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.185721] RIP: 0010:gre_timeout_obj_to_nlattr+0x77/0x1a0 [ 179.191360] Code: 97 85 c7 00 f1 f1 f1 f1 c7 40 04 04 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 b0 96 d3 fb 48 89 d8 48 c1 e8 03 <42> 0f b6 14 38 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 179.207957] kobject: 'loop1' (00000000765380da): kobject_uevent_env [ 179.210355] RSP: 0018:ffff88805eb173d0 EFLAGS: 00010246 [ 179.210369] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc900108ba000 [ 179.210378] RDX: 0000000000015b69 RSI: ffffffff8597a090 RDI: ffff8880a01fb3c0 [ 179.210393] RBP: ffff88805eb17460 R08: ffff88805f56a440 R09: ffff8880890800a8 17:46:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 17:46:12 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 179.222749] kobject: 'loop1' (00000000765380da): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 179.229439] R10: ffffed1011210014 R11: ffff8880890800a0 R12: 1ffff1100bd62e7b [ 179.229447] R13: ffff8880a01fb3c0 R14: ffff88805eb17438 R15: dffffc0000000000 [ 179.229459] FS: 00007f0ffea7f700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 179.229467] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 179.229474] CR2: 0000000000625208 CR3: 000000008f071000 CR4: 00000000001406f0 17:46:12 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 179.229485] DR0: ffffffff81000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 179.229492] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 179.229505] Call Trace: [ 179.281071] kobject: 'loop4' (00000000a00322e5): kobject_uevent_env [ 179.282538] ? memcpy+0x46/0x50 [ 179.282557] ? gre_print_conntrack+0xc0/0xc0 [ 179.282579] ? __nla_put+0x37/0x40 [ 179.294415] kobject: 'loop4' (00000000a00322e5): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 179.297144] ? nla_put+0x116/0x150 [ 179.297165] cttimeout_default_get+0x69a/0xa80 [ 179.297187] ? cttimeout_del_timeout+0x1a0/0x1a0 [ 179.347426] ? __lock_is_held+0x9f/0x140 [ 179.351507] ? cttimeout_del_timeout+0x1a0/0x1a0 [ 179.353908] kobject: 'loop1' (00000000765380da): kobject_uevent_env [ 179.356275] nfnetlink_rcv_msg+0xd12/0xfe0 [ 179.356312] ? nfnetlink_bind+0x2d0/0x2d0 [ 179.356337] ? avc_has_extended_perms+0x10f0/0x10f0 [ 179.362848] kobject: 'loop1' (00000000765380da): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 179.367081] ? __dev_queue_xmit+0x1764/0x3020 [ 179.367101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.367115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.367137] ? cred_has_capability+0x193/0x320 [ 179.405927] ? selinux_ipv4_output+0x50/0x50 [ 179.410360] ? __sanitizer_cov_trace_cmp1+0x3/0x20 [ 179.415572] netlink_rcv_skb+0x180/0x460 [ 179.419624] ? nfnetlink_bind+0x2d0/0x2d0 [ 179.423762] ? netlink_ack+0xb60/0xb60 [ 179.427645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.433187] ? ns_capable+0x23/0x30 [ 179.436836] ? __netlink_ns_capable+0x104/0x140 [ 179.441501] nfnetlink_rcv+0x1c0/0x460 [ 179.445376] ? nfnetlink_rcv_batch+0x1770/0x1770 [ 179.450126] ? netlink_deliver_tap+0x254/0xc20 [ 179.454781] netlink_unicast+0x53c/0x720 [ 179.458850] ? netlink_attachskb+0x770/0x770 [ 179.463254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.468812] netlink_sendmsg+0x8ae/0xd70 [ 179.472904] ? netlink_unicast+0x720/0x720 [ 179.477132] ? selinux_socket_sendmsg+0x36/0x40 [ 179.481799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.487418] ? security_socket_sendmsg+0x93/0xc0 [ 179.492163] ? netlink_unicast+0x720/0x720 [ 179.496400] sock_sendmsg+0xdd/0x130 [ 179.500104] ___sys_sendmsg+0x806/0x930 [ 179.504154] ? copy_msghdr_from_user+0x430/0x430 [ 179.508930] ? lock_downgrade+0x810/0x810 [ 179.513079] ? kasan_check_read+0x11/0x20 [ 179.517219] ? __fget+0x367/0x540 [ 179.520663] ? iterate_fd+0x360/0x360 [ 179.524454] ? lock_downgrade+0x810/0x810 [ 179.528594] ? __fget_light+0x1a9/0x230 [ 179.532576] ? __fdget+0x1b/0x20 [ 179.535933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 179.541459] __sys_sendmsg+0x105/0x1d0 [ 179.545341] ? __ia32_sys_shutdown+0x80/0x80 [ 179.549753] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 179.554517] ? do_syscall_64+0x26/0x610 [ 179.558485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.563835] ? do_syscall_64+0x26/0x610 [ 179.567800] __x64_sys_sendmsg+0x78/0xb0 [ 179.571850] do_syscall_64+0x103/0x610 [ 179.575769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.580972] RIP: 0033:0x458c29 [ 179.584249] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.603142] RSP: 002b:00007f0ffea7ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 179.610871] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 179.618161] RDX: 0000000000000000 RSI: 0000000020dddfc8 RDI: 0000000000000003 [ 179.625426] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 179.632695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ffea7f6d4 [ 179.639981] R13: 00000000004c632a R14: 00000000004da8e8 R15: 00000000ffffffff [ 179.647257] Modules linked in: [ 179.653953] kobject: 'loop3' (0000000098573834): kobject_uevent_env [ 179.662599] ---[ end trace d849f0dc51e32b33 ]--- [ 179.668224] RIP: 0010:gre_timeout_obj_to_nlattr+0x77/0x1a0 [ 179.674147] Code: 97 85 c7 00 f1 f1 f1 f1 c7 40 04 04 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 b0 96 d3 fb 48 89 d8 48 c1 e8 03 <42> 0f b6 14 38 48 89 d8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 179.677068] kobject: 'loop3' (0000000098573834): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 179.696736] RSP: 0018:ffff88805eb173d0 EFLAGS: 00010246 [ 179.710961] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc900108ba000 [ 179.718409] RDX: 0000000000015b69 RSI: ffffffff8597a090 RDI: ffff8880a01fb3c0 [ 179.725408] kobject: 'loop0' (00000000d6e71442): kobject_uevent_env [ 179.726524] RBP: ffff88805eb17460 R08: ffff88805f56a440 R09: ffff8880890800a8 [ 179.739732] R10: ffffed1011210014 R11: ffff8880890800a0 R12: 1ffff1100bd62e7b 17:46:12 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x3ff, 0x4) read(r0, &(0x7f0000000140)=""/104, 0x68) 17:46:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000240)=0x9, 0x5f) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 17:46:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:46:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000200)=0x81, 0x4) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_misc(r1, &(0x7f0000000fc0)={'syz0', "b9db052a964d758f95fe22a213b4bb238a8f5132d9c76559ac9ad554f9a5a30c9d8f5f83c1a8f46492b81ed2a8f0e1d9e72ee2214419b9552462ef400ad5925f174a91f21ddf69fd9f3167ab07e4557fecec5713f5d48b3e3a614c5435b253d64736a03ba1b38cfd6ddeb9def285cf82421bac8f6d7d6a282171c43256ec9d47c68c1c6aff876271f20d05408ed21feb67f25bea4277ec17d720fae549a7f1025734a2ac50e67947efa78c37be35425cf4596898ef146b26d43a6b9286ac2a4dac7e89c5be2c1a6f64"}, 0xcd) [ 179.743981] kobject: 'loop0' (00000000d6e71442): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 179.749358] R13: ffff8880a01fb3c0 R14: ffff88805eb17438 R15: dffffc0000000000 [ 179.778061] FS: 00007f0ffea7f700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 179.800805] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 179.803979] kobject: 'loop2' (00000000a64a3d7b): kobject_uevent_env [ 179.814817] CR2: 0000001b32722000 CR3: 000000008f071000 CR4: 00000000001406f0 [ 179.821568] kobject: 'loop2' (00000000a64a3d7b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 179.831658] DR0: ffffffff81000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 179.831668] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 179.831676] Kernel panic - not syncing: Fatal exception [ 179.832777] Kernel Offset: disabled [ 179.862425] Rebooting in 86400 seconds..